Contribution Guidelines Logo

Contribution Guidelines

0
Free
Visit Website

To add to the list: Submit a pull request To remove from the list: Open an issue List items should be sorted alphabetically. Each item should be limited to one link The link should be the name of the package or project Direct installation commands should follow on the next line, indented by 2 spaces and enclosed in `` Descriptions should be clear, concise, and non-promotional Descriptions should follow the link, on the same line Run npm install and then npm test to verify everything is correct according to guidelines Quality standard: To stay on the list, package repositories should adhere to these quality standards: Generally useful to the community, Functional, Stable Reporting issues: Please open an issue if you find anything that could be improved or have suggestions for making the list a more valuable resource. Thanks!

FEATURES

ALTERNATIVES

Blue-team capture the flag competition for improving cybersecurity skills.

Korean cyber-security challenge platform for exploiting and defending web application vulnerabilities.

Find books at your favorite store and stay updated on new features with Universal Book Links.

A comprehensive mind map diagram summarizing Javascript syntax and concepts in a single picture.

A guide outlining security considerations for using OpenLDAP Software, including selective listening and IP firewall capabilities.

A vulnerable web application for learning about web application vulnerabilities and writing secure code.

CloudGoat is a 'Vulnerable by Design' AWS deployment tool for honing cloud cybersecurity skills through 'capture-the-flag' style scenarios.

A guide on how to contribute to the Ayehu Custom Activities Repository