Stars: 0
Security
| List | Description | Link |
|---|---|---|
| Application Security | Application Security | |
| Security | Security | |
| CTF | - Capture The Flag. | CTF |
| Malware Analysis | Malware Analysis | |
| Android Security | Android Security | |
| Hacking | Hacking | |
| Honeypots | - Deception trap, designed to entice an attacker into attempting to compromise the information systems in an organization. | Honeypots |
| Incident Response | Incident Response | |
| Vehicle Security and Car Hacking | Vehicle Security and Car Hacking | |
| Web Security | - Security of web apps & services. | Web Security |
| Lockpicking | - The art of unlocking a lock by manipulating its components without the key. | Lockpicking |
| Cybersecurity Blue Team | - Groups of individuals who identify security flaws in information technology systems. | Cybersecurity Blue Team |
| Fuzzing | - Automated software testing technique that involves feeding pseudo-randomly generated input data. | Fuzzing |
| Embedded and IoT Security | Embedded and IoT Security | |
| GDPR | - Regulation on data protection and privacy for all individuals within EU. | GDPR |