Adarsh Pandey (AdarshPandey-dev)

AdarshPandey-dev

Geek Repo

Location:India

Twitter:@InfosecMonk

Github PK Tool:Github PK Tool

Adarsh Pandey's repositories

Awesome-KQL

Config files for my GitHub profile.

cs-video-courses

List of Computer Science courses with video lectures.

Stargazers:1Issues:0Issues:0

awesome-aws-security

Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security

License:GPL-3.0Stargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0
Stargazers:0Issues:1Issues:0

awesome-cloud-security

🛡️ Awesome Cloud Security Resources ⚔️

Stargazers:0Issues:0Issues:0

awesome-ics-writeups

Collection of writeups on ICS/SCADA security.

Stargazers:0Issues:0Issues:0

Awesome-Smart-Contract-Security

A curated list of Smart Contract Security materials and resources For Researchers

Stargazers:0Issues:0Issues:0

awesome-vehicle-security

🚗 A curated list of resources for learning about vehicle security and car hacking.

License:CC0-1.0Stargazers:0Issues:0Issues:0

Azure-Sentinel-Notebooks

Interactive Azure Sentinel Notebooks provides security insights and actions to investigate anomalies and hunt for malicious behaviors.

Language:Jupyter NotebookLicense:MITStargazers:0Issues:0Issues:0

BugBountyBooks

A collection of PDF/books about the modern web application security and bug bounty.

Stargazers:0Issues:0Issues:0

Cloud-Security-Attacks

Azure and AWS Attacks

Stargazers:0Issues:0Issues:0
Language:HackStargazers:0Issues:0Issues:0

defi-threat

a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations on decentralized finance

Language:JavaScriptLicense:MPL-2.0Stargazers:0Issues:0Issues:0

detection-rules

Rules for Elastic Security's detection engine

Language:PythonLicense:NOASSERTIONStargazers:0Issues:0Issues:0

Digital-Forensics-Guide

Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.

Language:PythonStargazers:0Issues:0Issues:0

ethereumbook

Mastering Ethereum, by Andreas M. Antonopoulos, Gavin Wood

Language:JavaScriptLicense:NOASSERTIONStargazers:0Issues:0Issues:0

Galaxy-Bugbounty-Checklist

Tips and Tutorials for Bug Bounty and also Penetration Tests.

Stargazers:0Issues:0Issues:0

Hunting-Queries-Detection-Rules

Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.

Stargazers:0Issues:0Issues:0

juice-shop

OWASP Juice Shop: Probably the most modern and sophisticated insecure web application

Language:TypeScriptLicense:MITStargazers:0Issues:0Issues:0

KQL

Threat Hunting query in Microsoft 365 Defender, XDR. Provide out-of-the-box KQL hunting queries - App, Email, Identity and Endpoint.

Stargazers:0Issues:0Issues:0

Offensivesecurity-Checklists

Checklists for Testing Security environment

Stargazers:0Issues:0Issues:0

OSCE-Complete-Guide

OSWE, OSEP, OSED

Stargazers:0Issues:0Issues:0
Language:HTMLStargazers:0Issues:0Issues:0

security-study-plan

Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOps and so on...

Stargazers:0Issues:0Issues:0
License:MITStargazers:0Issues:1Issues:0

smart-contract-attack-vectors

A curated list of smart contract attack vectors

Stargazers:0Issues:0Issues:0

smart-contract-best-practices

A guide to smart contract security best practices

Stargazers:0Issues:0Issues:0

whoami

Whoami

Stargazers:0Issues:1Issues:0

wstg

The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.

Language:DockerfileLicense:CC-BY-SA-4.0Stargazers:0Issues:0Issues:0