Best practices, tools, and libraries for securing applications and protecting data from threats and vulnerabilities.
Showing 29 awesome lists
Exploration of computer systems and networks for vulnerabilities
Practices and tools for protecting digital information
Process of examining and understanding malware behavior
Protection of web applications and services from threats
Competitive cybersecurity challenge format
Decoy systems designed to detect and analyze attacks
Security practices and tools for Android applications
Process of managing and mitigating security incidents
Practices and tools for securing applications
Group focused on defending against cyber threats
Techniques and tools for securing vehicles and hacking
Educational resources for hands-on cyber security training
Security practices for embedded systems and IoT devices
Skill of unlocking locks without a key
Integration of security practices into DevOps workflows
Tools for packing and unpacking executable files
Framework for building cybersecurity detection controls
Locations known for hacking and tech meetups
Annual reports analyzing cybersecurity trends and insights
Automated testing technique using random data inputs
Process of recovering passwords from scrambled data
Research on vulnerabilities in CI/CD processes
Vulnerability exploiting machine learning model inputs
Methods used by malware to maintain system access
Regulation on data protection and privacy in the EU
High-performance intrusion detection and prevention system
Security framework for the Ethereum Virtual Machine
Games designed to enhance cybersecurity skills
Identity standard and authentication protocol based on OAuth 2.0
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.