Contribution Guidelines Logo

Contribution Guidelines

0
Free
Visit Website

To add to the list: Submit a pull request To remove from the list: Open an issue List items should be sorted alphabetically. Each item should be limited to one link The link should be the name of the package or project Direct installation commands should follow on the next line, indented by 2 spaces and enclosed in `` Descriptions should be clear, concise, and non-promotional Descriptions should follow the link, on the same line Run npm install and then npm test to verify everything is correct according to guidelines Quality standard: To stay on the list, package repositories should adhere to these quality standards: Generally useful to the community, Functional, Stable Reporting issues: Please open an issue if you find anything that could be improved or have suggestions for making the list a more valuable resource. Thanks!

FEATURES

ALTERNATIVES

A vulnerable web application for learning about web application vulnerabilities and writing secure code.

One of the oldest hacker conventions in America, offering a unique and personal experience.

A workshop on hacking Bluetooth Smart locks, covering architecture, vulnerabilities, and exploitation techniques.

A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.

Teaching Security provides educational resources and lessons for teaching cybersecurity concepts to high school students.

A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.

Cheat sheet with common enumeration and attack methods for Windows Active Directory.

The best security training environment for Developers and AppSec Professionals.