Venu's starred repositories
awesome-forensics
A curated list of awesome forensic analysis tools and resources
Malware-Analysis-Training
Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.
malware-samples
Malware samples, analysis exercises and other interesting resources.
awesome-malware-analysis
Defund the Police.
awesome-threat-modelling
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
Ghostwriter
The SpecterOps project management and reporting engine
iOS-Internals-and-Security-Testing
iOS is Apple's proprietary operating system that runs on the iPhone, iPod Touch and iPad. A lot of components are specific to iOS. Here are key features of the iOS hardware and software security architecture and guide how to test your applications.
Cybersecurity-Interview-Questions
List of questions, answers and random notes for security interviews
awesome-tech-blogs
A list of Tech Blogs.
awesome-reversing
A curated list of awesome reversing resources
50-Days-Of-SQLi
Learning and hunting SQL injection bugs for 50 continuous days
awesome-interview-questions
:octocat: A curated awesome list of lists of interview questions. Feel free to contribute! :mortar_board:
all-about-code-review
This is a curated list of resources about code reviews: articles, tools, trainings...
coding-interview-university
A complete computer science study plan to become a software engineer.
system-design-primer
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
learn-cantrill-io-labs
Standard and Advanced Demos for learn.cantrill.io courses
archerysec
ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.
devsecops-resources
A list of resources blogs talks material about DevSecOps
container-security-checklist
Checklist for container security - devsecops practices
awesome-anti-forensic
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attributes. This all includes tools to work with anything in general that makes changes to a system for the purposes of hiding information.
Threat_Model_Examples
Collection of Threat Models
Awesome-RCE-techniques
Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
Facebook-BugBounty-Writeups
Collection of Facebook Bug Bounty Writeups
Dorks-collections-list
List of Github repositories and articles with list of dorks for different search engines
awesome-security-hardening
A collection of awesome security hardening guides, tools and other resources