Pinned Repositories
AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
awesome-cloud-security
🛡️ Awesome Cloud Security Resources ⚔️
awesome-threat-modelling
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
awsmonitoringstrategies
Scripts and other text provided as part of my AWS Monitoring Strategies course
az500
Exam AZ-500: Microsoft Azure Security Technologies Crash Course
Azure-Sentinel
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
devops-essentials-sample-app
github-slideshow
A robot powered training repository :robot:
prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains all CIS controls and many more additional checks that help on GDPR, HIPAA and other security frameworks.
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
devarora8's Repositories
devarora8/AllAboutBugBounty
All about bug bounty (bypasses, payloads, and etc)
devarora8/awesome-cloud-security
🛡️ Awesome Cloud Security Resources ⚔️
devarora8/awesome-threat-modelling
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
devarora8/awsmonitoringstrategies
Scripts and other text provided as part of my AWS Monitoring Strategies course
devarora8/az500
Exam AZ-500: Microsoft Azure Security Technologies Crash Course
devarora8/Azure-Sentinel
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
devarora8/devops-essentials-sample-app
devarora8/github-slideshow
A robot powered training repository :robot:
devarora8/prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains all CIS controls and many more additional checks that help on GDPR, HIPAA and other security frameworks.
devarora8/Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
devarora8/rules
Repository of yara rules