Nathan Aw (nathanawmk)

nathanawmk

Geek Repo

Company:https://www.linkedin.com/in/awnathan

Location:Singapore

Home Page:https://www.hyperledger.org/news/speakersbureau

Twitter:@nathan_mk_aw

Github PK Tool:Github PK Tool

Nathan Aw's repositories

cicd-goat

A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.

Language:PythonLicense:Apache-2.0Stargazers:1Issues:1Issues:0

microservices-demo

Sample cloud-native application with 10 microservices showcasing Kubernetes, Istio, gRPC and OpenCensus.

Language:PythonLicense:Apache-2.0Stargazers:1Issues:2Issues:0

Raccoon

A high performance offensive security tool for reconnaissance and vulnerability scanning

Language:PythonLicense:MITStargazers:1Issues:1Issues:0
Stargazers:0Issues:1Issues:0

attack-stix-data

STIX data representing MITRE ATT&CK

Language:PythonLicense:NOASSERTIONStargazers:0Issues:1Issues:0

Awesome-AI-Security

:file_folder: #AISecurity

Stargazers:0Issues:1Issues:0

awesome-fuzzing

A curated list of awesome Fuzzing(or Fuzz Testing) for software security

Stargazers:0Issues:1Issues:0

Awesome-Fuzzing-1

A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.

License:CC0-1.0Stargazers:0Issues:1Issues:0

awesome-ml-for-cybersecurity

:octocat: Machine Learning for Cyber Security

License:NOASSERTIONStargazers:0Issues:1Issues:0

awful-ai

😈Awful AI is a curated list to track current scary usages of AI - hoping to raise awareness

Stargazers:0Issues:1Issues:0

black-hat-rust

Applied offensive security with Rust - https://kerkour.com/black-hat-rust

Language:RustStargazers:0Issues:1Issues:0

codellama

Inference code for CodeLlama models

Language:PythonLicense:NOASSERTIONStargazers:0Issues:1Issues:0

compendium-of-cves-ttp-initial-access

This is a compendium of known CVEs with a special focus on its initial access - for without initial access there can be no Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Lateral Movement, Command and Control, Exfiltration or Impact. Therefore, the focus of this compendium is on initial access - the "how"

Stargazers:0Issues:0Issues:0

eran

ETH Robustness Analyzer for Deep Neural Networks

Language:PythonLicense:Apache-2.0Stargazers:0Issues:1Issues:0

FuzzingPaper

Recent Fuzzing Paper

License:MITStargazers:0Issues:1Issues:0

Morpheus

Morpheus SDK

Language:PythonLicense:Apache-2.0Stargazers:0Issues:1Issues:0

neural-network-hacking

Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security

Language:PythonLicense:MITStargazers:0Issues:1Issues:0

prisma-cloud-policies

PCS Policies Release Notice

License:NOASSERTIONStargazers:0Issues:1Issues:0

rapidscan

:new: The Multi-Tool Web Vulnerability Scanner.

Language:PythonLicense:GPL-2.0Stargazers:0Issues:1Issues:0

register

Grab your own sweet-looking '.is-a.dev' subdomain

Language:JavaScriptLicense:GPL-3.0Stargazers:0Issues:1Issues:0
Language:GoStargazers:0Issues:1Issues:0

sigstore

Common go library shared across sigstore services and clients

Language:GoLicense:Apache-2.0Stargazers:0Issues:1Issues:0
Language:Q#License:BSL-1.0Stargazers:0Issues:1Issues:0

threat-matrix-cicd

Threat matrix for CI/CD Pipeline

Stargazers:0Issues:1Issues:0

ThreatHunting

An informational repo about hunting for adversaries in your IT environment.

Stargazers:0Issues:1Issues:0
License:MITStargazers:0Issues:2Issues:0

weather

weather

Language:JavaScriptStargazers:0Issues:2Issues:0