Adarsh Pandey's Projects
If you are forking please do not forget to star the repo
Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS Security
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
🛡️ Awesome Cloud Security Resources ⚔️
🔗 All the resources I could find for learning Ethical Hacking and Penetration Testing.
Collection of writeups on ICS/SCADA security.
Config files for my GitHub profile.
A curated list of Smart Contract Security materials and resources For Researchers
🚗 A curated list of resources for learning about vehicle security and car hacking.
Interactive Azure Sentinel Notebooks provides security insights and actions to investigate anomalies and hunt for malicious behaviors.
This is a resource factory for anyone looking forward to starting bug hunting and would require guidance as a beginner.
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
A collection of PDF/books about the modern web application security and bug bounty.
Open source education content for the researcher community
Azure and AWS Attacks
List of Computer Science courses with video lectures.
a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations on decentralized finance
Rules for Elastic Security's detection engine
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Mastering Ethereum, by Andreas M. Antonopoulos, Gavin Wood
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
Threat Hunting query in Microsoft 365 Defender, XDR. Provide out-of-the-box KQL hunting queries - App, Email, Identity and Endpoint.
This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.