Skip to content
View CyberSecArmy's full-sized avatar

Block or report CyberSecArmy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. AWS-Offensive-Exploitation---Pentesting AWS-Offensive-Exploitation---Pentesting Public

    This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastructure, its various services and overall AWS cloud penetration …

    11 4

  2. aws_security_automation aws_security_automation Public

    This repository provides an insight about the security automation in AWS cloud infrastructure. It would help an individual to kick start with some basic scripting of security in aws using Python. P…

    Python 1 2

  3. Web-Application-Vulnerabilities Web-Application-Vulnerabilities Public

    This repo illustrates various different types of web application vulnerabilities, how to identify them and fix. It also describes how poor coding practices could have large impact on the applicatio…

    1 1

  4. Implementing-Security-Headers-for-Web-Applications Implementing-Security-Headers-for-Web-Applications Public

    This page provides details about various security headers which could be set for a web application. The implementation procedure is easy enough and requires configuration of web config file. It is …

    1

  5. Security_E-books_Collection Security_E-books_Collection Public

    This repository contains e-books to build up your security knowledge base in the field of Web Application Security and its Pentesting.

    1 2