chillipal's Stars
cugu/awesome-forensics
⭐️ A curated list of awesome forensic analysis tools and resources
jefferywmoore/CISSP-Study-Resources
CISSP Resources
paralus/paralus
All-in-one Kubernetes access manager. User-level credentials, RBAC, SSO, audit logs.
zhiwehu/Python-programming-exercises
100+ Python challenging programming exercises
dabeaz-course/practical-python
Practical Python Programming (course by @dabeaz)
trekhleb/learn-python
📚 Playground and cheatsheet for learning Python. Collection of Python scripts that are split by topics and contain code examples with explanations.
Avik-Jain/100-Days-Of-ML-Code
100 Days of ML Coding
Asabeneh/30-Days-Of-Python
30 days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than100 days, follow your own pace. These videos may help too: https://www.youtube.com/channel/UC7PNRuno1rzYPb1xLa4yktw
practical-tutorials/project-based-learning
Curated list of project-based tutorials
TheAlgorithms/Python
All Algorithms implemented in Python
lkarlslund/ldapnomnom
Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (cLDAP)
MahdiMashrur/Awesome-Application-Security-Checklist
Checklist of the most important security countermeasures when designing, creating, testing your web/mobile application
BC-SECURITY/Beginners-Guide-to-Obfuscation
toniblyx/my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
4ndersonLin/awesome-cloud-security
🛡️ Awesome Cloud Security Resources ⚔️
Yelp/detect-secrets
An enterprise friendly way of detecting and preventing secrets in code.
ine-labs/AWSGoat
AWSGoat : A Damn Vulnerable AWS Infrastructure
t3l3machus/pentest-pivoting
A compact guide to network pivoting for penetration testings / CTF challenges.
paulmillr/encrypted-dns
DNS over HTTPS config profiles for iOS & macOS
TalEliyahu/Threat_Model_Examples
Collection of Threat Models
center-for-threat-informed-defense/security-stack-mappings
🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
spipm/Depix
Recovers passwords from pixelized screenshots
Ignitetechnologies/Nmap-For-Pentester
This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."
darkquasar/AzureHunter
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
sottlmarek/DevSecOps
Ultimate DevSecOps library
OWASP/DevSecOpsGuideline
The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.
zalando/restful-api-guidelines
A model set of guidelines for RESTful APIs and Events, created by Zalando
OpenAPITools/openapi-generator
OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec (v2, v3)
risk-first/website
Risk-First Software Development
AmnestyTech/investigations
Indicators from Amnesty International's investigations