Lists (32)
Sort Name ascending (A-Z)
ad attack
70 repositories
Api
5 repositories
Assessment
72 repositories
AWS
41 repositories
Azure
32 repositories
Burp
15 repositories
Cloud
40 repositories
cost
1 repository
course
19 repositories
dev sec
32 repositories
Farknet
2 repositories
Flipper
1 repository
Flopper
GCP
4 repositories
GPT
22 repositories
Hardening
35 repositories
hunting attack
38 repositories
iot
7 repositories
ir
114 repositories
learning
15 repositories
Linux
9 repositories
🚀 My stack
1 repository
Nginx
2 repositories
ntlm relay
6 repositories
Osint
67 repositories
pt
206 repositories
red team
20 repositories
Reverse Engineering
2 repositories
SAP
5 repositories
soc
39 repositories
usefull
111 repositories
yara
18 repositories
Stars
- All languages
- ABAP
- Assembly
- AutoIt
- Batchfile
- Bicep
- C
- C#
- C++
- CSS
- Dart
- Dockerfile
- Go
- HCL
- HTML
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- PHP
- Pascal
- PowerShell
- Python
- R
- Rich Text Format
- Roff
- Ruby
- Rust
- Scala
- Shell
- Solidity
- Svelte
- Swift
- TypeScript
- Vala
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Zeek
5
stars
written in Dockerfile
Clear filter
🐳 Elastic Stack (ELK) v8+ on Docker with Compose. Pre-configured out of the box to enable Logging, Metrics, APM, Alerting, ML, and SIEM features. Up with a Single Command.
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
Streamlit app providing real-time question-answering chat over a document collection.