Stars: 0
Security
List | Description | Link |
---|---|---|
Application Security | Application Security | |
Security | Security | |
CTF | - Capture The Flag. | CTF |
Malware Analysis | Malware Analysis | |
Android Security | Android Security | |
Hacking | Hacking | |
Honeypots | - Deception trap, designed to entice an attacker into attempting to compromise the information systems in an organization. | Honeypots |
Incident Response | Incident Response | |
Vehicle Security and Car Hacking | Vehicle Security and Car Hacking | |
Web Security | - Security of web apps & services. | Web Security |
Lockpicking | - The art of unlocking a lock by manipulating its components without the key. | Lockpicking |
Cybersecurity Blue Team | - Groups of individuals who identify security flaws in information technology systems. | Cybersecurity Blue Team |
Fuzzing | - Automated software testing technique that involves feeding pseudo-randomly generated input data. | Fuzzing |
Embedded and IoT Security | Embedded and IoT Security | |
GDPR | - Regulation on data protection and privacy for all individuals within EU. | GDPR |