Stars
A free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatab…
🐸 Scans your Git repository with JFrog Xray for security vulnerabilities. 🤖
📝 A curated list of awesome Raspberry Pi tools, projects, images and resources
The Microsoft Cybersecurity Reference Architecture (https://aka.ms/MCRA) describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures and capabilities.
Docs and samples for privileged identity and access management in Microsoft Azure and Microsoft Entra.
AWESOME-Azure-Architecture - https://aka.ms/AwesomeAzureArchitecture
AWESOME-Azure-Architecture - https://aka.ms/AwesomeAzureArchitecture
CI/CD Demo on OpenShift
Mindmaps, graphs and other helpful resources for preparing to pass AZ-300 and AZ-301 exams
tyf666 / az-301-prep-kit
Forked from Piotr1215/az-301-prep-kitExercises and notes preparing for az-301 exam
tyf666 / routersploit
Forked from threat9/routersploitExploitation Framework for Embedded Devices
Supplemental information and resources for the Security Benchmark documentation available at https://docs.microsoft.com/azure/security/benchmarks/.
tyf666 / dca-prep-kit
Forked from Piotr1215/cloudrumblePreparation notes and tips & tricks for cloud an IT certifications
tyf666 / az-300-prep-kit
Forked from Piotr1215/az-300-prep-kitExercises and notes preparing for az-300 exam
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
A list of awesome beginners-friendly projects.
Supplemental information and resources for the Security Benchmark documentation available at https://docs.microsoft.com/azure/security/benchmarks/.
Exploitation Framework for Embedded Devices
Sample blog application implemented using Python and Django.