🔐
DevSec
💻 GitHub
  • 👋Welcome
    • DevSec
    • Glossary
    • Contributing
    • Discussions
  • 📖Resources
    • Articles
    • Books
    • Communities
    • Institutions
    • Conferences
    • Sites
    • Podcasts
    • Training
    • Other
  • ⚒️Tools
    • Static Analysis
    • Dynamic Analysis
    • Vulnerabilities Analysis
    • Dependency Management
    • Supply Chain
    • Secrets
      • Secrets Management
      • Secrets Scanning
    • Infrastructure as Code (IaC)
    • Other
  • 🔧Generic Development
    • Security Basics
    • Containers
    • Git & other VCS
    • Cryptography
  • ☁️Web Development
    • Generic
    • APIs
  • ☁️Cloud
    • Cloud native
    • Kubernetes
  • 😈On the other side
    • Red team
Powered by GitBook
On this page
  • Intro
  • Institutions
  • Organizations / Foundations
  • Communities
  • Enterprises / Products
  • Lists
  • "Awesome" Lists
  • Checklists
  • Guides
  • Collections
  • Security Development
  • Guidelines
  • Frameworks
  • Others
  • Labs
  • Templates
  • Roadmaps
  • Knowledge base
  • Advisories databases
  • Projects
  • Vulnerable to learn

Was this helpful?

Edit on GitHub
  1. Resources

Other

Here it goes a very long list of all kinds of resources

PreviousTrainingNextStatic Analysis

Last updated 1 year ago

Was this helpful?

Intro

In this page there are a lot of resources I found along the way... They are organized and can appear or match better in other section, but the main purpose of this section is to provide external links to all possible related security resources.

If you detect some broken links, outdated resources or something missing, please help by editing this page 🙏 Outdated resources are marked with the symbol: ⚠️

Institutions

    • : the security incident response center of reference for citizens and private law entities in Spain operated by the National Institute of Cybersecurity (INCIBE).

Organizations / Foundations

Communities

Enterprises / Products

Lists

"Awesome" Lists

Checklists

Guides

Collections

Security Development

Guidelines

Frameworks

Others

Labs

Templates

Roadmaps

Knowledge base

Advisories databases

Projects

Vulnerable to learn

: The Open Worldwide Application Security Project® (OWASP) is a nonprofit foundation that works to improve the security of software.

: The Open Information Security Foundation is a 501(c)3 nonprofit organization created to build community and to support open source security technologies like Suricata, the world-class IDS/IPS network monitoring engine.

: harnessing the power of global IT community to safeguard public and private organizations against cyber threats.

: The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.

: The PCI Security Standards Council (PCI SSC) is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments worldwide.

: an ecosystem provides multiple tools to assist administrators and auditors with assessment, measurement, and enforcement of security baselines.

: a global industry forum where business leaders and technical experts come together to exchange insights and ideas on creating, improving, and promoting scalable and effective software security programs.

: The collaborative intelligence standard powering intelligence and information exchange, sharing and modeling.

: protect and defend the most trustworthy platform for developers everywhere to create and build software.

: empowers your teams to balance speed and security by automating software delivery and securing your end-to-end software supply chain.

: achieve a state of Clean Code so that all code is fit for development and production.

: the monitoring and security platform for cloud applications.

: find and automatically fix vulnerabilities in your code, open source dependencies, containers, and infrastructure as code.

: applying systems thinking to national challenges in defense, cybersecurity, healthcare, homeland security, & transportation.

: several security solutions.

: A powerful, practitioner-first approach for comprehensive, operationalized risk & threat response and results.

: a global network designed to make everything you connect to the Internet secure, private, fast, and reliable. Secure your websites, APIs, and Internet applications. Protect corporate networks, employees, and devices. Write and deploy code that runs on the network edge.

: several solutions.

: several solutions and tools (some open source).

: Software Supply Chain Security.

: software security - helps you protect your bottom line by building trust in your software.

: one of the leading European providers of cybersecurity services. A technical team of top-level specialists and state-of-the-art solutions to provide auditing, pentesting, vulnerability management, and incident response services.

: a global cybersecurity company that delivers a wide range of services: Managed Detection and Response (MDR), Managed Security Services (MSS), Cyber Intelligence Services (CIS), Red Team Services (RTS), Governance, Risk and Compliance (GRC) and Cybersecurity Technology Integration (CTI).

: One platform to secure them all.

: Keep your digital systems securely up and running Fend off threat actors. Diminish downtime. Fix issues faster. Do it all with Splunk, the key to enterprise resilience.

: team of experts use cutting-edge technology to analyze darknets and provide Threat Intelligence solutions to keep your business safe from cyber attacks.

: To protect the activity of our customers by generating reliable and secure cyber environments that allow them to maintain and improve the trust of their stakeholders.

: Outpost24's intelligence-led cyber risk management solution makes it easy to identify security gaps in your attack surface and prioritize vulnerabilities that matter.

: a leading pure player cybersecurity provider, we promote the transformation of the business of organizations through cybersecurity risk management to protect their people and assets.

: a European business group specialised in Cybersecurity, Intelligence and Property Security. Our main mission is to assist you on the road to security, always striving for excellence.

: Shift Everywhere With the Leading Cloud-Native AppSec Platform.

: provider of information security and compliance cloud solutions.

: GuardRails eliminates vulnerabilities at source, educates developers in real-time, minimizes the security bottleneck, and helps organizations go faster to market.

: We stop cyberattacks, we stop breaches, we stop a lot of bad things from happening.

: git security scanning & secrets detection.

: make security problems more identifiable, accessible and easier to fix.

: extend DevOps Value with Cloud-to-Edge Security and Compliance.

: find and fix the vulnerabilities that put your web applications at risk of attack.

: an open source, cloud native solution for providing, securing, and observing network connectivity between workloads, fueled by the revolutionary Kernel technology eBPF.

: secures your Kubernetes by blocking the deployment of misconfigured resources.

: Open Source Data Security Platform.

: the Software Supply Chain Security Company.

: dynamic cyber defense solutions by combining services and products powered by industry-leading expertise, intelligence and innovative technology.

: the open source API security platform.

(Chinese): Cloud-Native Security Platform.

: control your application security from code to deployment.

: Detect, Protect and Remediate Cloud Attacks.

: real-time & crowdsourced protection against aggressive IPs.

: Exposure Management Company.

: End-to-end Python Dependency Security.

: an open-source software company that builds tools to detect and remediate vulnerabilities across your modern tech stack.

: identify security issues, prioritize what matters, and protect network assets. Built for modern operational environments on the cloud and on-premise.

: provides cyber threat intelligence, knowledge subsystems and crisis response solutions.

: pentests, security engineering, online training and OpenSource.

: penetration testing services.

: managed detection and response to secure your endpoints, cloud...

: open source Vulnerability Management Platform.

: provides cutting edge incident response automation to hundreds of SOC, CERT & CSIRT teams.

: Easy, Flexible Cybersecurity Solutions for Everyone.

: cybersecurity leader.

: offers the most comprehensive solutions to help industries accelerate security, maximize productivity, preserve user experience, and lower total cost of ownership.

(): their solutions leverage our global security platform to protect your unique environment and all of its critical applications, so you can confidently innovate and expand your business, without creating new vulnerabilities.

: DDoS protection, Application protection, Public Cloud protection and Application delivery.

: unique approach and deep technical expertise allow us to help our customers solve today’s biggest challenges for the most complex networks in the world.

: software intelligence automated - actionable insights into your software inner workings.

: provider of open source vulnerability management.

: multiple techniques in a single solution to secure your technology throughout the software development lifecycle.

: natively embed security into your development tools and workflows to secure your cloud-native applications at the source.

: secure your Kubernetes and CI/CD in less than three minutes with the most powerful open-source Kubernetes security solution on the planet.

: cloud tools.

: software consulting with attention to security above compliance.

: get unmatched visibility and insights into every asset connected to your network.

: alleviates the pain of traditional SIEMs with detection-as-code, a robust security data lake, and high scalability with zero-ops.

: No-code automation for security teams.

: fights phishing and provides visibility, defense-in-depth, and security infrastructure for Office 365 and Google Workspace.

: Turning internet noise into intelligence.

: The Open Infrastructure Access Platform. The easiest, most secure way to access all your infrastructure.

: Order, configure and deploy your Canaries throughout your network. Your Canaries run in the background, waiting for intruders.

: Secure your attack surface with continuous asset discovery and attack path analysis.

: Secure your entire cloud from one place.

: automates your compliance journey from start to audit-ready and beyond and provides support from the security and compliance experts who built it.

: Continuously Find and Fix Flaws at Every Stage of The Modern Software Development Lifecycle.

: empowers and protects information to elevate every person and every organization to their full potential.

: the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Alibaba Cloud, Google Cloud and Kubernetes.

: makes it simple for developers to find, triage, and fix application security bugs. AppSec Closer to the Keyboard than Ever Before.

: fights vulnerabilities and provides visibility, defense-in-depth, and proactive supply chain protection for JavaScript and Python dependencies.

: Discover and block API attacks using inline enforcement and developer enablement tools.

: empowers security teams with the most comprehensive, accurate, and up-to-date map of the internet to defend attack surfaces and hunt for threats.

: Security from Application to Endpoint.

: vulnerability scanner for your web applications.

: modern application security.

: Ignite innovation velocity on the only unified security platform built to get secure code moving through the entire application development pipeline and continuously protect your apps across the complete software lifecycle.

: Fortified software delivery.

: A simple and powerful DevSecOps software to automate thousands of checks and eliminate human errors in Source Code and Cloud Infrastructure. Integrable into anything.

: business application cybersecurity.

: detecting and protecting your apps and APIs anywhere.

: web security company on a mission to enable the world to secure the web.

: Check Point is constantly innovating to deliver security solutions that raise the bar for businesses worldwide, as well as a track record of success to back it up.

(part of Check Point)

: Cloud Native and Open Source Security.

: offers the most complete and extensible Identity Security Platform, protecting identities and critical assets by enabling Zero Trust and enforcing least privilege.

: to help organizations build, develop, and support systems to deliver secure products and services.

: browser security technologies, enabling you to detect and mitigate attacks, fast.

: challenge your team, regardless of level, to a training platform that puts real world infrastructure first. Learn from expert instructors and prove your knowledge in Networking, Cyber Security, Cloud and Data Science.

: take full control of security, compliance and health with a toolkit that will revolutionize the way you use open source.

: Empower your team with cybersecurity solutions that work in harmony and help you detect, protect, respond and recover from cyberattacks (Vulnerability Management, Penetration testing, Risk and Compilance, Endpoint security, Web App firewall, Cloud Security, etc.).

: Real-time visibility, control, and protection of data assets across any cloud with data security posture management (DSPM). Dig allows you to protect all the data that matters without giving up cloud agility and speed.

: Elite Blockchain Security Solutions.

: All-in-One Platform: fully automated solution streamlines discovering applications, APIs, and infrastructure, conducting threat emulation through automated penetration testing, validating zero-trust principles, intelligent API Security, checking the codes, and finally assessing risks and correlating findings, all while providing actionable remediation and reporting.

by 4ndersonLin

by TeamSix

by Funkymyster

(English/Chinese)

: security resources for the Ruby community.

: list of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

: a curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliability Engineering (SRE).

: a Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.

(English/Chinese): a collection of cybersecurity RSS.

(Chinese)

: lots of resources in several formats from Veracode.

by Synopsys

by Microsoft

from OWASP

by NIST

(by SANS)

(by digital.ai)

(): hands on labs and code to help you learn, measure, and build using architectural best practices.

: roadmap for everyone who wants DevSecOps.

: is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

: is a repository of helpful information for developers, DevOps practitioners, and their organizations.

: a distributed vulnerability database for Open Source.

(): security vulnerability database inclusive of CVEs and GitHub originated security advisories from the world of open source software.

()

: Open Source Insights is a service developed and hosted by Google to help developers better understand the structure, construction, and security of open source software packages.

(PyPI)

: vulnerability database for the Rust ecosystem.

: the Ruby Advisory Database is a community effort to compile all security advisories that are relevant to Ruby libraries.

: the industry standard for mobile app security.

: provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.

: a comprehensive and well maintained registry of known vulnerable web and mobile applications currently available.

(): Probably the most modern and sophisticated insecure web application.

(): provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.

(): Damn Vulnerable Serverless Application (DVSA) is a deliberately vulnerable application aiming to be an aid for security professionals to test their skills and tools in a legal environment, help developers better understand the processes of securing serverless applications and to aid both students & teachers to learn about serverless application security in a controlled class room environment.

Checkmarx : a built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Security vulnerabilities within your own API Security CTF.

(): memorable site for testing clients against bad SSL configs.

: a deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.

INE : a Damn Vulnerable Azure Infrastructure.

Bridgecrew : "Vulnerable by Design" Terraform repository. TerraGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.

Bridgecrew : Cfngoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments (Cloudformation).

(): a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground.

: vulnerable Terraform Infrastructure.

: a very powerful and friendly project for learning Java vulnerability code.

📖
CISA (Cybersecurity and Infrastructure Security Agency)
GitHub
NIST (National Institute of Standards and Technology)
GitHub
CIS (Center for Internet Security)
GitHub
INCIBE (National Institute of Cybersecurity (Spain))
INCIBE-CERT
GitHub
OWASP
OISF
CIS (Center for Internet Security)
CSA (Cloud Security Aliance)
PCI (Security Standards Council)
OpenSCAP
SAFECode
MISP Standard
MISP Threat Sharing
GitHub Security
GitLab Security
Sonar (SonarSource)
Datadog
Snyk
MITRE
Palo Alto Networks
Rapid7
Cloudflare
NCC Group
Aqua
Anchore
Synopsis
Tarlogic
cipher
Yogosha
Splunk
Byron Labs
Wise security global
Outpost24
S21Sec
ZeroLynx
Checkmarkx
Qualys
GuardRails
CrowdStrike
GitGuardian
TruffleSecurity
Progress Chef (Security)
Acunetix
Cilium
datree
LunaSec
Phylum
Mandiant
Metlo
HummerRisk
Cider
deepfence
CrowdSec
tenable
PyUp
Project Discovery
Smallstep
Filigran
OpenSecurity
Rhino Security Labs
Red Canary
Faraday
StrangeBee
Cisco Duo
Kaspersky
Fortinet
Akamai
Security Solutions
Radware
NetScout
CAST
Greenbone
Fluid attacks
Bridgecrew
Armo (Armosec)
Turbot
Paragon
runZero
Panther
Tines
Material
GreyNoise
Teleport
Thinkst Canary
JupiterOne
LaceWork
Drata
VeraCode
Micro Focus (Open Text)
Orca Security
StackHawk
Socket
Impart Security
Censys
HCL Software
Invicti
Data Theorem
Contrast Security
ChainGuard
Betterscan
Onapsis
imperva
PortSwigger
Check Point
Spectral
Controlplane
CyberArk
Puma Security
ReportURI
INE
debricked
PurpleBox
Dig Security
Halborn
Prancer
Main Awesome repo (Security section)
Awesome Cloud Security
Awesome Cloud Security (Chinese)
Awesome Cloud Security
Awesome Cloud Native Security
Awesome Cloud Cost Control
Awesome Game Security
Awesome IoT Hacks
Awesome Golang Security
Awesome Python Security
Awesome PHP Security
Awesome Java Security
Awesome dotnet Security
Awesome API Security
Awesome Node.js Security
Awesome Threat Detection and Hunting
Awesome Cybersecurity Blue Team
Awesome Sec talks
Awesome Security Hardening
Awesome Infosec
Awesome AppSec
Awesome Threat Intelligence
Awesome Threat Modelling
Awesome Incident Response
Awesome Security
Awesome Android Security
Awesome Web Security
Awesome Embedded and IoT Security
Awesome Cybersecurity Blue Team
Awesome EVM Security
Awesome DevSecOps
Awesome Cyber Security University
Awesome CodeQL
Awesome YARA
Awesome Static Analysis
Awesome Dynamic Analysis
Awesome IAM List
Security Guide for Developers: Checklist
API Security Checklist
Container Security checklist: from the image to the workload
Rails Security Checklist
Personal Security Checklist
Security Guide for Developers
Microsoft Best practices for a secure software supply chain
Kubernetes Security - Best Practice Guide
API Security Best Practices (GitGuardian)
DevSecOps Playbook
How to Secure Anything
Tencent SecGuide (Chinese)
Secure iOS application development
31 days of API Security Tips
Frontend tech list (security) (Chinese)
Can I takeover XYZ? (sub)domains with dangling DNS records
Web Security Learning (Chinese)
Security 101 for SaaS startups
Smart contract best practices
The practical Linux Hardening Guide
How to Secure a Linux Server
Ultimate DevSecOps library
RubySec
My arsenal of AWS security tools
How they SRE
HolyTips
CyberSecurityRSS
AI for security learning
Veracode Resources
OWASP Application Security Verification Standard (ASVS)
CERT - Coding Standards
OWASP Proactive Controls
Mozilla - WebAppSec / Secure Coding Guidelines
OWASP Secure Coding Practices-Quick Reference Guide
Building Security In Maturity Model (BSIMM)
Microsoft SDL practices
OWASP Software Assurance Maturity Model (SAMM)
Secure Software Development Framework (SSDF)
Nine Key Cloud Security Concentration & SWAT Checklist
DevOps Periodic Table
AWS Well-architected labs
web
Secure Electron template
DevSecOps
MITRE ATTACK (ATT&CK)
SecureFlag Knowledge Base
OSV
OSV.dev mantained converters
GitHub Advisory Database
web
Security advisories reported on GitHub
National Vulnerability Database
Global Security Database
web
debricked Vulnerability Database
Socket.dev package search
Open Source Insights - devs.dev
npm Security Advisories Database
Veracode Vulnerability Database
FriendsOfPHP Database
Go Vulnerability Database
Python Packaging Advisory Database
RustSec
Ruby Advisory Database
LoopBack Security Advisories (LBSA)
Google OSS-Fuzz vulnerabilities
Rocky Linux
AlmaLinux
OWASP API Security Project
OWASP Secure Headers Project
OWASP MASVS (Mobile Application Security Verification Standard)
VulnHub
OWASP Vulnerable Web Applications Directory (VWAD)
OWASP Juice Shop
web
OWASP NodeGoat
web
OWASP DVSA
web
capital
Badssl.com
web
CI/CD GOAT
Azure Goat
TerraGoat
Cfngoat
Kubernetes Goat
web
KaiMonkey
Java Sec Code