4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

file-path-traversal-testing

zebbern

3.1K

Tests for directory traversal and LFI vulnerabilities in web applications using path traversal attack methodologies.

Path Traversal
LFI
Penetration Testing
4. Security & Compliance

security-scanning-tools

zebbern

3.1K

Provides guidance on security scanning tools and methodologies for vulnerability assessment, network scanning, web application security, and compliance evaluation.

Vulnerability Scanning
Network Scanning
Compliance Assessment
4. Security & Compliance

idor-vulnerability-testing

zebbern

3.1K

Guides detection, exploitation, and remediation of Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.

IDOR
Broken Access Control
Penetration Testing
4. Security & Compliance

windows-privilege-escalation

zebbern

3.1K

Provides guidance for discovering and exploiting Windows privilege escalation vulnerabilities during security assessments and penetration testing.

Windows
Privilege Escalation
Post-Exploitation
4. Security & Compliance

metasploit-framework

zebbern

3.1K

Provides comprehensive guidance for penetration testing, vulnerability exploitation, and post-exploitation using the Metasploit Framework.

Metasploit
Penetration Testing
Exploits
4. Security & Compliance

cross-site-scripting-and-html-injection-testing

zebbern

3.1K

Provides techniques for detecting, exploiting, and understanding XSS and HTML injection vulnerabilities in web applications.

XSS
HTML Injection
CSP
4. Security & Compliance

wordpress-penetration-testing

zebbern

3.1K

Provides comprehensive WordPress security assessments including vulnerability scanning, enumeration, and exploitation using WPScan.

WordPress
WPScan
Vulnerability Scanning
4. Security & Compliance

ssh-penetration-testing

zebbern

3.1K

Provides SSH penetration testing methodologies including configuration enumeration, credential brute-forcing, and vulnerability exploitation.

SSH
Penetration Testing
Brute Force
4. Security & Compliance

aws-penetration-testing

zebbern

3.1K

Conducts AWS security assessments including penetration testing, IAM enumeration, S3 bucket analysis, and cloud service exploitation.

AWS
Penetration Testing
IAM
4. Security & Compliance

wireshark-network-traffic-analysis

zebbern

3.1K

Provides techniques for network packet capture, filtering, and analysis using Wireshark to detect anomalies and investigate suspicious traffic.

Wireshark
PCAP
Network Anomaly Detection
4. Security & Compliance

top-100-web-vulnerabilities-reference

zebbern

3.1K

Provides comprehensive reference for top 100 web vulnerabilities including definitions, root causes, impacts, and OWASP-aligned mitigation strategies.

OWASP
Web Vulnerabilities
Security Mitigation
4. Security & Compliance

html-injection-testing

zebbern

3.1K

Tests for HTML injection vulnerabilities using proven attack techniques and methodologies to identify content injection risks.

HTML Injection
Vulnerability Testing
Web Security
4. Security & Compliance

network-101

zebbern

3.1K

Provides guidance for configuring and testing network services including web servers, HTTP/HTTPS, SNMP, and SMB for penetration testing environments.

SNMP
SMB
Penetration Testing
4. Security & Compliance

smtp-penetration-testing

zebbern

3.1K

Performs SMTP server security assessments including user enumeration, open relay testing, banner grabbing, and credential brute-forcing.

SMTP
Penetration Testing
Open Relay
4. Security & Compliance

burp-suite-web-application-testing

zebbern

3.1K

Provides step-by-step guidance for intercepting, modifying, and testing web application requests using Burp Suite's core security features.

Burp Suite
Vulnerability Scanning
Web Application Security
4. Security & Compliance

red-team-tools-and-methodology

zebbern

3.1K

Enables red team methodology, bug bounty hunting, and vulnerability enumeration with expert security tool configurations.

Red Team
Bug Bounty
XSS
4. Security & Compliance

linux-privilege-escalation

zebbern

3.1K

Provides techniques for identifying and exploiting privilege escalation vectors on Linux systems, including SUID binaries and sudo misconfigurations.

Privilege Escalation
SUID
Sudo
4. Security & Compliance

api-fuzzing-for-bug-bounty

zebbern

3.1K

Performs API security assessments including fuzzing, IDOR detection, and penetration testing for bug bounty programs.

API Fuzzing
IDOR
Penetration Testing
4. Security & Compliance

ethical-hacking-methodology

zebbern

3.1K

Provides structured ethical hacking methodology including penetration testing lifecycle, reconnaissance, vulnerability scanning, exploitation, and report writing.

Penetration Testing
Vulnerability Scanning
Reconnaissance
4. Security & Compliance

pentest-commands

zebbern

3.1K

Provides essential command references for penetration testing tools including Nmap, Metasploit, Hydra, and Nikto.

Nmap
Metasploit
Nikto
4. Security & Compliance

anti-cheat-systems

gmh5225

2.7K

Guides research on game anti-cheat systems (EAC, BattlEye, Vanguard), covering architecture, detection methods, and security bypass strategies.

EAC
BattlEye
Vanguard
4. Security & Compliance

windows-kernel-security

gmh5225

2.7K

Guides Windows kernel security research including driver development, system callbacks, PatchGuard, DSE, and kernel exploitation techniques.

PatchGuard
DSE
Kernel Exploitation
4. Security & Compliance

reverse-engineering-tools

gmh5225

2.7K

Guide to reverse engineering tools and techniques for game security research, covering debuggers, disassemblers, and binary analysis.

debuggers
disassemblers
binary analysis
4. Security & Compliance

mobile-security

gmh5225

2.7K

Provides security guidance for mobile games on Android and iOS, covering reverse engineering, anti-cheat systems, and root/jailbreak detection bypass techniques.

Reverse Engineering
Anti-Cheat Systems
Root Detection Bypass
4. Security & Compliance
PreviousPage 4 of 151 PageNext