├── Basics of Web & Network └── Readme.md ├── Books └── Readme.md ├── CTF Walkthroughs ├── Basic Pentesting 1.pdf ├── CTF Walkthrough - Basic Pentesting 1 (Method 1).jpg ├── CTF Walkthrough - Basic Pentesting 1 (Method 2).jpg ├── CTF Walkthrough - Brainpan1.jpg ├── CTF Walkthrough - Fristileaks 1.3.jpg ├── CTF Walkthrough - Kioptrix 1.jpg ├── CTF Walkthrough - Mr.Robot (1 of 2).jpg ├── CTF Walkthrough - Mr.Robot (2 of 2).jpg ├── CTF Walkthrough - PwnLab-init.jpg ├── CTF Walkthrough - PwnOS 2.0.jpg ├── CTF Walkthrough - Remote Vulnerability 101 (Pentester Academy).jpg ├── CTF Walkthrough - SickOS.jpg ├── CTF Walkthrough - Skytower.jpg ├── CTF Walkthrough - Stapler 1.jpg ├── CTF Walkthrough - Tr0ll 1.jpg ├── CTF Walkthrough - VulnOS 2.jpg ├── CTF Walkthrough - Vulnix (1 of 2).jpg ├── CTF Walkthrough - Vulnix (2 of 2).jpg ├── Mr.Robot Walkthroughpdf.pdf └── Readme.md ├── Data Protection ├── Data Protection and Privacy.pptx └── Readme.md ├── Exploit Development └── Readme.md ├── How-To Tutorials └── Readme.md ├── Interview Questions ├── Interview Questions for Application Security Testers.pdf ├── Interview Questions for Digital Forensics Investigator.pdf ├── Interview Questions for Penetration Testers.pdf ├── Interview Questions for SOC Analyst.pdf └── README.md ├── Linux Basics ├── Basics of Linux Commands.pdf └── Readme.md ├── Misc Content By SCSP ├── Bug Bounty Tips │ ├── Readme.md │ ├── bugbountytip.jpg │ ├── bugbountytip2.jpg │ └── bugbountytip3.jpg ├── Linux Privilege Escalation Cheat Sheet.pdf ├── Memory Forensics Cheat Sheet.pdf ├── OCSP Cheat Sheet Part 2.pdf ├── OCSP Cheat Sheet.pdf ├── OSINT Tools │ ├── Readme.md │ ├── buster.jpg │ ├── dangerzone.jpg │ ├── metagofil.jpg │ ├── osint harvester.jpg │ ├── osint tineye.jpg │ ├── reconizer.jpg │ ├── shodan.jpg │ └── spiderfoot.jpg ├── Readme.md ├── SIEM Use Cases Part 1.pdf ├── SIEM Use Cases Part 2.pdf ├── SIEM Use Cases Part 3.pdf ├── Subdomain Enumeration Cheat Sheet.pdf ├── Types of Windows Authentication Mechanisms.pdf ├── Where to find the OWASP Mobile Top 10 Vulnerabilities.pdf └── Windows Privilege Escalation Cheat Sheet.pdf ├── Mobile Application Security └── Readme.md ├── Online Practice Labs └── Readme.md ├── Programming Resources └── Readme.md ├── README.md ├── Resources and Writeups └── Readme.md ├── SCSP Presentations └── Readme.md ├── SIEM Solutions └── Readme.md ├── SNORT IPS-IDS ├── Readme.md ├── SNORT Installation Guide.pdf ├── SNORT PoC Video.mp4 └── SNORT Working PoC.pdf ├── Vulnerability Databases └── Readme.md ├── Vulnerable Virtual Machines └── Readme.md └── Web Application Security ├── Readme.md ├── Server Side Template Injection ├── Readme.md ├── SSTI.md └── SSTI.py └── XXE ├── Readme.md ├── XXE.pdf └── XXE.pptx /Basics of Web & Network/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Basics of Web & Network/Readme.md -------------------------------------------------------------------------------- /Books/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Books/Readme.md -------------------------------------------------------------------------------- /CTF Walkthroughs/Basic Pentesting 1.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/Basic Pentesting 1.pdf -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Basic Pentesting 1 (Method 1).jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Basic Pentesting 1 (Method 1).jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Basic Pentesting 1 (Method 2).jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Basic Pentesting 1 (Method 2).jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Brainpan1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Brainpan1.jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Fristileaks 1.3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Fristileaks 1.3.jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Kioptrix 1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Kioptrix 1.jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Mr.Robot (1 of 2).jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Mr.Robot (1 of 2).jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Mr.Robot (2 of 2).jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Mr.Robot (2 of 2).jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - PwnLab-init.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - PwnLab-init.jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - PwnOS 2.0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - PwnOS 2.0.jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Remote Vulnerability 101 (Pentester Academy).jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Remote Vulnerability 101 (Pentester Academy).jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - SickOS.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - SickOS.jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Skytower.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Skytower.jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Stapler 1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Stapler 1.jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Tr0ll 1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Tr0ll 1.jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - VulnOS 2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - VulnOS 2.jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Vulnix (1 of 2).jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Vulnix (1 of 2).jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/CTF Walkthrough - Vulnix (2 of 2).jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/CTF Walkthrough - Vulnix (2 of 2).jpg -------------------------------------------------------------------------------- /CTF Walkthroughs/Mr.Robot Walkthroughpdf.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/Mr.Robot Walkthroughpdf.pdf -------------------------------------------------------------------------------- /CTF Walkthroughs/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/CTF Walkthroughs/Readme.md -------------------------------------------------------------------------------- /Data Protection/Data Protection and Privacy.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Data Protection/Data Protection and Privacy.pptx -------------------------------------------------------------------------------- /Data Protection/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Data Protection/Readme.md -------------------------------------------------------------------------------- /Exploit Development/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Exploit Development/Readme.md -------------------------------------------------------------------------------- /How-To Tutorials/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/How-To Tutorials/Readme.md -------------------------------------------------------------------------------- /Interview Questions/Interview Questions for Application Security Testers.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Interview Questions/Interview Questions for Application Security Testers.pdf -------------------------------------------------------------------------------- /Interview Questions/Interview Questions for Digital Forensics Investigator.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Interview Questions/Interview Questions for Digital Forensics Investigator.pdf -------------------------------------------------------------------------------- /Interview Questions/Interview Questions for Penetration Testers.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Interview Questions/Interview Questions for Penetration Testers.pdf -------------------------------------------------------------------------------- /Interview Questions/Interview Questions for SOC Analyst.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Interview Questions/Interview Questions for SOC Analyst.pdf -------------------------------------------------------------------------------- /Interview Questions/README.md: -------------------------------------------------------------------------------- 1 | 2 | # Cyber Security Interview Questions 3 | 4 | -------------------------------------------------------------------------------- /Linux Basics/Basics of Linux Commands.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Linux Basics/Basics of Linux Commands.pdf -------------------------------------------------------------------------------- /Linux Basics/Readme.md: -------------------------------------------------------------------------------- 1 | List of Resources for using Linux 2 | -------------------------------------------------------------------------------- /Misc Content By SCSP/Bug Bounty Tips/Readme.md: -------------------------------------------------------------------------------- 1 |

Bug bounty tips

2 | -------------------------------------------------------------------------------- /Misc Content By SCSP/Bug Bounty Tips/bugbountytip.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Bug Bounty Tips/bugbountytip.jpg -------------------------------------------------------------------------------- /Misc Content By SCSP/Bug Bounty Tips/bugbountytip2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Bug Bounty Tips/bugbountytip2.jpg -------------------------------------------------------------------------------- /Misc Content By SCSP/Bug Bounty Tips/bugbountytip3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Bug Bounty Tips/bugbountytip3.jpg -------------------------------------------------------------------------------- /Misc Content By SCSP/Linux Privilege Escalation Cheat Sheet.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Linux Privilege Escalation Cheat Sheet.pdf -------------------------------------------------------------------------------- /Misc Content By SCSP/Memory Forensics Cheat Sheet.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Memory Forensics Cheat Sheet.pdf -------------------------------------------------------------------------------- /Misc Content By SCSP/OCSP Cheat Sheet Part 2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OCSP Cheat Sheet Part 2.pdf -------------------------------------------------------------------------------- /Misc Content By SCSP/OCSP Cheat Sheet.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OCSP Cheat Sheet.pdf -------------------------------------------------------------------------------- /Misc Content By SCSP/OSINT Tools/Readme.md: -------------------------------------------------------------------------------- 1 |

OSINT TOOLS

2 | -------------------------------------------------------------------------------- /Misc Content By SCSP/OSINT Tools/buster.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/buster.jpg -------------------------------------------------------------------------------- /Misc Content By SCSP/OSINT Tools/dangerzone.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/dangerzone.jpg -------------------------------------------------------------------------------- /Misc Content By SCSP/OSINT Tools/metagofil.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/metagofil.jpg -------------------------------------------------------------------------------- /Misc Content By SCSP/OSINT Tools/osint harvester.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/osint harvester.jpg -------------------------------------------------------------------------------- /Misc Content By SCSP/OSINT Tools/osint tineye.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/osint tineye.jpg -------------------------------------------------------------------------------- /Misc Content By SCSP/OSINT Tools/reconizer.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/reconizer.jpg -------------------------------------------------------------------------------- /Misc Content By SCSP/OSINT Tools/shodan.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/shodan.jpg -------------------------------------------------------------------------------- /Misc Content By SCSP/OSINT Tools/spiderfoot.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/OSINT Tools/spiderfoot.jpg -------------------------------------------------------------------------------- /Misc Content By SCSP/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Readme.md -------------------------------------------------------------------------------- /Misc Content By SCSP/SIEM Use Cases Part 1.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/SIEM Use Cases Part 1.pdf -------------------------------------------------------------------------------- /Misc Content By SCSP/SIEM Use Cases Part 2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/SIEM Use Cases Part 2.pdf -------------------------------------------------------------------------------- /Misc Content By SCSP/SIEM Use Cases Part 3.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/SIEM Use Cases Part 3.pdf -------------------------------------------------------------------------------- /Misc Content By SCSP/Subdomain Enumeration Cheat Sheet.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Subdomain Enumeration Cheat Sheet.pdf -------------------------------------------------------------------------------- /Misc Content By SCSP/Types of Windows Authentication Mechanisms.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Types of Windows Authentication Mechanisms.pdf -------------------------------------------------------------------------------- /Misc Content By SCSP/Where to find the OWASP Mobile Top 10 Vulnerabilities.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Where to find the OWASP Mobile Top 10 Vulnerabilities.pdf -------------------------------------------------------------------------------- /Misc Content By SCSP/Windows Privilege Escalation Cheat Sheet.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Misc Content By SCSP/Windows Privilege Escalation Cheat Sheet.pdf -------------------------------------------------------------------------------- /Mobile Application Security/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Mobile Application Security/Readme.md -------------------------------------------------------------------------------- /Online Practice Labs/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Online Practice Labs/Readme.md -------------------------------------------------------------------------------- /Programming Resources/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Programming Resources/Readme.md -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/README.md -------------------------------------------------------------------------------- /Resources and Writeups/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Resources and Writeups/Readme.md -------------------------------------------------------------------------------- /SCSP Presentations/Readme.md: -------------------------------------------------------------------------------- 1 | # Presentation Decks for SCSP Seminars 2 | 3 | ### Back [⤴](https://github.com/scsp-community/Cyber-Sec-Resources) 4 | 5 | -------------------------------------------------------------------------------- /SIEM Solutions/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/SIEM Solutions/Readme.md -------------------------------------------------------------------------------- /SNORT IPS-IDS/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/SNORT IPS-IDS/Readme.md -------------------------------------------------------------------------------- /SNORT IPS-IDS/SNORT Installation Guide.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/SNORT IPS-IDS/SNORT Installation Guide.pdf -------------------------------------------------------------------------------- /SNORT IPS-IDS/SNORT PoC Video.mp4: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/SNORT IPS-IDS/SNORT PoC Video.mp4 -------------------------------------------------------------------------------- /SNORT IPS-IDS/SNORT Working PoC.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/SNORT IPS-IDS/SNORT Working PoC.pdf -------------------------------------------------------------------------------- /Vulnerability Databases/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Vulnerability Databases/Readme.md -------------------------------------------------------------------------------- /Vulnerable Virtual Machines/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Vulnerable Virtual Machines/Readme.md -------------------------------------------------------------------------------- /Web Application Security/Readme.md: -------------------------------------------------------------------------------- 1 | List of Resourses for Web based Attacks and Vulnerabilities 2 | -------------------------------------------------------------------------------- /Web Application Security/Server Side Template Injection/Readme.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Web Application Security/Server Side Template Injection/Readme.md -------------------------------------------------------------------------------- /Web Application Security/Server Side Template Injection/SSTI.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Web Application Security/Server Side Template Injection/SSTI.md -------------------------------------------------------------------------------- /Web Application Security/Server Side Template Injection/SSTI.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Web Application Security/Server Side Template Injection/SSTI.py -------------------------------------------------------------------------------- /Web Application Security/XXE/Readme.md: -------------------------------------------------------------------------------- 1 | XXE Resources 2 | -------------------------------------------------------------------------------- /Web Application Security/XXE/XXE.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Web Application Security/XXE/XXE.pdf -------------------------------------------------------------------------------- /Web Application Security/XXE/XXE.pptx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/scspcommunity/Cyber-Sec-Resources/HEAD/Web Application Security/XXE/XXE.pptx --------------------------------------------------------------------------------