Ishaq Mohammed's Projects
CTF Field Guide
Ops School Curriculum
2018 - Vulnerable App for Demos/Training and Workshops
PoC for CVE-2015-6086
Cybersecurity Career Path
Libros de Cyber Security
Damn vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.
A deliberately vulnerable modern day app with lots of DOM related bugs
Building an Active Directory domain and hacking it
DC Law - statutes and code - in xml format. (project: https://github.com/DCCouncil/dc-law)
Repository of various public white-box cryptographic implementations and their practical attacks.
Dependency-Track is an intelligent Software Composition Analysis (SCA) platform that allows organizations to identify and reduce risk from the use of third-party and open source components.
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
Roadmap to becoming a web developer in 2018
The OWASP Guide
A wiki of Devops Tools, Tutorials and Scripts
Virtual environment for learning DevSecOps
Create a Virtual Environment for DevSecOps activities.
[DEPRECATED] DexPatcher workflow automation scripts for Linux
Web path scanner
Dirty COW
DefectDojo is an open-source application vulnerability correlation and security orchestration application
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.
:whale: Docker CI/CD :recycle: w/ CircleCI :o:, Github :octocat:, Dockerhub :ship:, Tutum :whale2: & AWS :package:
:closed_lock_with_key: Docker Container for Penetration Testing & Security