Ishaq Mohammed's repositories
computer-science
:mortar_board: Path to a free self-taught education in Computer Science!
OSCP-Archives
An archive of everything related to OSCP
quick-SQL-cheatsheet
A quick reminder of all SQL queries and examples on how to use them.
Web-CTF-Cheatsheet
Web CTF CheatSheet 🐈
awesome-app-ideas
List of awesome app ideas
CloudSecurity
Cloud security projects with Spring Cloud Config Server and Vault
cover-card
Just a business card, no blog required!
Damn-Vulnerable-OAuth-2.0-Applications
Damn vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.
DarthSidious
Building an Active Directory domain and hacking it
dependency-track
Dependency-Track is an intelligent Software Composition Analysis (SCA) platform that allows organizations to identify and reduce risk from the use of third-party and open source components.
DependencyCheck
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
examples
Serverless Examples – A collection of boilerplates and examples of serverless architectures built with the Serverless Framework on AWS Lambda, Microsoft Azure, Google Cloud Functions, and more.
headless-burp
Automate security tests using Burp Suite.
Java-Web-Security
Java-Web-Security - Sichere Webanwendungen mit Java entwickeln
javascript-algorithms
Algorithms and data structures implemented in JavaScript with explanations and links to further readings
my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
node-sec-patterns
Security design pattern support for Node.js
NodeJS-Sample-App
Sample Employee CRUD application with Node.js, Express and MongoDB
prowler
AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark and additional checks. Official CIS for AWS guide: https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
Python
All Algorithms implemented in Python
pytm
A Pythonic framework for threat modeling
salus
Security scanner coordinator
uxss-db
🔪Browser logic-based vulnerabilities DB :skull_and_crossbones: