Süleyman ERGEN's repositories
Subdomain-Enumeration-Guide
This is a comprehensive subdomain enumeration Guide
cryptopals-writeups
Matasano Cryptopals writeups and Python 3 solutions (https://cryptopals.com/)
android-penetration-testing-cheat-sheet
Work in progress... Thanks for all the stars, I will try to prioritize this project :)
awesome-osint
:scream: A curated list of amazingly awesome OSINT
b9ui
b9ui
bitwarden-clients
Bitwarden client applications (web, browser extension, desktop, and cli)
bootloader-unlock-wall-of-shame
Keeping track of companies that "care about your data 🥺"
coraza-traefik
Traefik plugin for Coraza WAF
custom-crypto-burp-extension
A Burp Suite extension that can be modified to allow transparent decryption of custom cryptography schemes
custom-crypto-example-webapp
An example web application that uses custom cryptography to obfuscate a login endpoint
DevSecOps-Playbook
This is a step-by-step guide to implementing a DevSecOps program for any size organization
hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
how-to-secure-anything
How to systematically secure anything: a repository about security engineering
image-scanners-assessment-study
Image Scanners Assessment Study
juice-shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
kou-fbe-latex-tez
Kocaeli Üniversitesi Fen Bilimleri Enstitüsü Latex için tez taslağı
mtkclient
MTK reverse engineering and flash tool
openvpn
OpenVPN is an open source VPN daemon
OSINT-Framework
OSINT Framework
owasp-mastg
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
Practical-Cryptography-for-Developers-Book
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
Security-Reference-Guide
All of the Best Links and Resources on Cyber Security