├── Basics of Web & Network
└── Readme.md
├── Books
└── Readme.md
├── CTF Walkthroughs
├── Basic Pentesting 1.pdf
├── CTF Walkthrough - Basic Pentesting 1 (Method 1).jpg
├── CTF Walkthrough - Basic Pentesting 1 (Method 2).jpg
├── CTF Walkthrough - Brainpan1.jpg
├── CTF Walkthrough - Fristileaks 1.3.jpg
├── CTF Walkthrough - Kioptrix 1.jpg
├── CTF Walkthrough - Mr.Robot (1 of 2).jpg
├── CTF Walkthrough - Mr.Robot (2 of 2).jpg
├── CTF Walkthrough - PwnLab-init.jpg
├── CTF Walkthrough - PwnOS 2.0.jpg
├── CTF Walkthrough - Remote Vulnerability 101 (Pentester Academy).jpg
├── CTF Walkthrough - SickOS.jpg
├── CTF Walkthrough - Skytower.jpg
├── CTF Walkthrough - Stapler 1.jpg
├── CTF Walkthrough - Tr0ll 1.jpg
├── CTF Walkthrough - VulnOS 2.jpg
├── CTF Walkthrough - Vulnix (1 of 2).jpg
├── CTF Walkthrough - Vulnix (2 of 2).jpg
├── Mr.Robot Walkthroughpdf.pdf
└── Readme.md
├── Data Protection
├── Data Protection and Privacy.pptx
└── Readme.md
├── Exploit Development
└── Readme.md
├── How-To Tutorials
└── Readme.md
├── Interview Questions
├── Interview Questions for Application Security Testers.pdf
├── Interview Questions for Digital Forensics Investigator.pdf
├── Interview Questions for Penetration Testers.pdf
├── Interview Questions for SOC Analyst.pdf
└── README.md
├── Linux Basics
├── Basics of Linux Commands.pdf
└── Readme.md
├── Misc Content By SCSP
├── Bug Bounty Tips
│ ├── Readme.md
│ ├── bugbountytip.jpg
│ ├── bugbountytip2.jpg
│ └── bugbountytip3.jpg
├── Linux Privilege Escalation Cheat Sheet.pdf
├── Memory Forensics Cheat Sheet.pdf
├── OCSP Cheat Sheet Part 2.pdf
├── OCSP Cheat Sheet.pdf
├── OSINT Tools
│ ├── Readme.md
│ ├── buster.jpg
│ ├── dangerzone.jpg
│ ├── metagofil.jpg
│ ├── osint harvester.jpg
│ ├── osint tineye.jpg
│ ├── reconizer.jpg
│ ├── shodan.jpg
│ └── spiderfoot.jpg
├── Readme.md
├── SIEM Use Cases Part 1.pdf
├── SIEM Use Cases Part 2.pdf
├── SIEM Use Cases Part 3.pdf
├── Subdomain Enumeration Cheat Sheet.pdf
├── Types of Windows Authentication Mechanisms.pdf
├── Where to find the OWASP Mobile Top 10 Vulnerabilities.pdf
└── Windows Privilege Escalation Cheat Sheet.pdf
├── Mobile Application Security
└── Readme.md
├── Online Practice Labs
└── Readme.md
├── Programming Resources
└── Readme.md
├── README.md
├── Resources and Writeups
└── Readme.md
├── SCSP Presentations
└── Readme.md
├── SIEM Solutions
└── Readme.md
├── SNORT IPS-IDS
├── Readme.md
├── SNORT Installation Guide.pdf
├── SNORT PoC Video.mp4
└── SNORT Working PoC.pdf
├── Vulnerability Databases
└── Readme.md
├── Vulnerable Virtual Machines
└── Readme.md
└── Web Application Security
├── Readme.md
├── Server Side Template Injection
├── Readme.md
├── SSTI.md
└── SSTI.py
└── XXE
├── Readme.md
├── XXE.pdf
└── XXE.pptx
/Basics of Web & Network/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Basics of Web & Network/Readme.md
--------------------------------------------------------------------------------
/Books/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Books/Readme.md
--------------------------------------------------------------------------------
/CTF Walkthroughs/Basic Pentesting 1.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/Basic Pentesting 1.pdf
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Basic Pentesting 1 (Method 1).jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Basic Pentesting 1 (Method 1).jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Basic Pentesting 1 (Method 2).jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Basic Pentesting 1 (Method 2).jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Brainpan1.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Brainpan1.jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Fristileaks 1.3.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Fristileaks 1.3.jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Kioptrix 1.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Kioptrix 1.jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Mr.Robot (1 of 2).jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Mr.Robot (1 of 2).jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Mr.Robot (2 of 2).jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Mr.Robot (2 of 2).jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - PwnLab-init.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - PwnLab-init.jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - PwnOS 2.0.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - PwnOS 2.0.jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Remote Vulnerability 101 (Pentester Academy).jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Remote Vulnerability 101 (Pentester Academy).jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - SickOS.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - SickOS.jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Skytower.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Skytower.jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Stapler 1.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Stapler 1.jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Tr0ll 1.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Tr0ll 1.jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - VulnOS 2.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - VulnOS 2.jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Vulnix (1 of 2).jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Vulnix (1 of 2).jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/CTF Walkthrough - Vulnix (2 of 2).jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Vulnix (2 of 2).jpg
--------------------------------------------------------------------------------
/CTF Walkthroughs/Mr.Robot Walkthroughpdf.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/Mr.Robot Walkthroughpdf.pdf
--------------------------------------------------------------------------------
/CTF Walkthroughs/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/Readme.md
--------------------------------------------------------------------------------
/Data Protection/Data Protection and Privacy.pptx:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Data Protection/Data Protection and Privacy.pptx
--------------------------------------------------------------------------------
/Data Protection/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Data Protection/Readme.md
--------------------------------------------------------------------------------
/Exploit Development/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Exploit Development/Readme.md
--------------------------------------------------------------------------------
/How-To Tutorials/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/How-To Tutorials/Readme.md
--------------------------------------------------------------------------------
/Interview Questions/Interview Questions for Application Security Testers.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Interview Questions/Interview Questions for Application Security Testers.pdf
--------------------------------------------------------------------------------
/Interview Questions/Interview Questions for Digital Forensics Investigator.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Interview Questions/Interview Questions for Digital Forensics Investigator.pdf
--------------------------------------------------------------------------------
/Interview Questions/Interview Questions for Penetration Testers.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Interview Questions/Interview Questions for Penetration Testers.pdf
--------------------------------------------------------------------------------
/Interview Questions/Interview Questions for SOC Analyst.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Interview Questions/Interview Questions for SOC Analyst.pdf
--------------------------------------------------------------------------------
/Interview Questions/README.md:
--------------------------------------------------------------------------------
1 |
2 | # Cyber Security Interview Questions
3 |
4 |
--------------------------------------------------------------------------------
/Linux Basics/Basics of Linux Commands.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Linux Basics/Basics of Linux Commands.pdf
--------------------------------------------------------------------------------
/Linux Basics/Readme.md:
--------------------------------------------------------------------------------
1 | List of Resources for using Linux
2 |
--------------------------------------------------------------------------------
/Misc Content By SCSP/Bug Bounty Tips/Readme.md:
--------------------------------------------------------------------------------
1 |
Bug bounty tips
2 |
--------------------------------------------------------------------------------
/Misc Content By SCSP/Bug Bounty Tips/bugbountytip.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Bug Bounty Tips/bugbountytip.jpg
--------------------------------------------------------------------------------
/Misc Content By SCSP/Bug Bounty Tips/bugbountytip2.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Bug Bounty Tips/bugbountytip2.jpg
--------------------------------------------------------------------------------
/Misc Content By SCSP/Bug Bounty Tips/bugbountytip3.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Bug Bounty Tips/bugbountytip3.jpg
--------------------------------------------------------------------------------
/Misc Content By SCSP/Linux Privilege Escalation Cheat Sheet.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Linux Privilege Escalation Cheat Sheet.pdf
--------------------------------------------------------------------------------
/Misc Content By SCSP/Memory Forensics Cheat Sheet.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Memory Forensics Cheat Sheet.pdf
--------------------------------------------------------------------------------
/Misc Content By SCSP/OCSP Cheat Sheet Part 2.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OCSP Cheat Sheet Part 2.pdf
--------------------------------------------------------------------------------
/Misc Content By SCSP/OCSP Cheat Sheet.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OCSP Cheat Sheet.pdf
--------------------------------------------------------------------------------
/Misc Content By SCSP/OSINT Tools/Readme.md:
--------------------------------------------------------------------------------
1 | OSINT TOOLS
2 |
--------------------------------------------------------------------------------
/Misc Content By SCSP/OSINT Tools/buster.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/buster.jpg
--------------------------------------------------------------------------------
/Misc Content By SCSP/OSINT Tools/dangerzone.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/dangerzone.jpg
--------------------------------------------------------------------------------
/Misc Content By SCSP/OSINT Tools/metagofil.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/metagofil.jpg
--------------------------------------------------------------------------------
/Misc Content By SCSP/OSINT Tools/osint harvester.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/osint harvester.jpg
--------------------------------------------------------------------------------
/Misc Content By SCSP/OSINT Tools/osint tineye.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/osint tineye.jpg
--------------------------------------------------------------------------------
/Misc Content By SCSP/OSINT Tools/reconizer.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/reconizer.jpg
--------------------------------------------------------------------------------
/Misc Content By SCSP/OSINT Tools/shodan.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/shodan.jpg
--------------------------------------------------------------------------------
/Misc Content By SCSP/OSINT Tools/spiderfoot.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/spiderfoot.jpg
--------------------------------------------------------------------------------
/Misc Content By SCSP/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Readme.md
--------------------------------------------------------------------------------
/Misc Content By SCSP/SIEM Use Cases Part 1.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/SIEM Use Cases Part 1.pdf
--------------------------------------------------------------------------------
/Misc Content By SCSP/SIEM Use Cases Part 2.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/SIEM Use Cases Part 2.pdf
--------------------------------------------------------------------------------
/Misc Content By SCSP/SIEM Use Cases Part 3.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/SIEM Use Cases Part 3.pdf
--------------------------------------------------------------------------------
/Misc Content By SCSP/Subdomain Enumeration Cheat Sheet.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Subdomain Enumeration Cheat Sheet.pdf
--------------------------------------------------------------------------------
/Misc Content By SCSP/Types of Windows Authentication Mechanisms.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Types of Windows Authentication Mechanisms.pdf
--------------------------------------------------------------------------------
/Misc Content By SCSP/Where to find the OWASP Mobile Top 10 Vulnerabilities.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Where to find the OWASP Mobile Top 10 Vulnerabilities.pdf
--------------------------------------------------------------------------------
/Misc Content By SCSP/Windows Privilege Escalation Cheat Sheet.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Windows Privilege Escalation Cheat Sheet.pdf
--------------------------------------------------------------------------------
/Mobile Application Security/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Mobile Application Security/Readme.md
--------------------------------------------------------------------------------
/Online Practice Labs/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Online Practice Labs/Readme.md
--------------------------------------------------------------------------------
/Programming Resources/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Programming Resources/Readme.md
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/README.md
--------------------------------------------------------------------------------
/Resources and Writeups/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Resources and Writeups/Readme.md
--------------------------------------------------------------------------------
/SCSP Presentations/Readme.md:
--------------------------------------------------------------------------------
1 | # Presentation Decks for SCSP Seminars
2 |
3 | ### Back [⤴](https://github.com/scsp-community/Cyber-Sec-Resources)
4 |
5 |
--------------------------------------------------------------------------------
/SIEM Solutions/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/SIEM Solutions/Readme.md
--------------------------------------------------------------------------------
/SNORT IPS-IDS/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/SNORT IPS-IDS/Readme.md
--------------------------------------------------------------------------------
/SNORT IPS-IDS/SNORT Installation Guide.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/SNORT IPS-IDS/SNORT Installation Guide.pdf
--------------------------------------------------------------------------------
/SNORT IPS-IDS/SNORT PoC Video.mp4:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/SNORT IPS-IDS/SNORT PoC Video.mp4
--------------------------------------------------------------------------------
/SNORT IPS-IDS/SNORT Working PoC.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/SNORT IPS-IDS/SNORT Working PoC.pdf
--------------------------------------------------------------------------------
/Vulnerability Databases/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Vulnerability Databases/Readme.md
--------------------------------------------------------------------------------
/Vulnerable Virtual Machines/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Vulnerable Virtual Machines/Readme.md
--------------------------------------------------------------------------------
/Web Application Security/Readme.md:
--------------------------------------------------------------------------------
1 | List of Resourses for Web based Attacks and Vulnerabilities
2 |
--------------------------------------------------------------------------------
/Web Application Security/Server Side Template Injection/Readme.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Web Application Security/Server Side Template Injection/Readme.md
--------------------------------------------------------------------------------
/Web Application Security/Server Side Template Injection/SSTI.md:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Web Application Security/Server Side Template Injection/SSTI.md
--------------------------------------------------------------------------------
/Web Application Security/Server Side Template Injection/SSTI.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Web Application Security/Server Side Template Injection/SSTI.py
--------------------------------------------------------------------------------
/Web Application Security/XXE/Readme.md:
--------------------------------------------------------------------------------
1 | XXE Resources
2 |
--------------------------------------------------------------------------------
/Web Application Security/XXE/XXE.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Web Application Security/XXE/XXE.pdf
--------------------------------------------------------------------------------
/Web Application Security/XXE/XXE.pptx:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Web Application Security/XXE/XXE.pptx
--------------------------------------------------------------------------------