Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added the following new entries: #90

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
{
"date": "2023-08-12",
"free": true,
"name": "CVE-2023-36884: Microsoft Office Zero Day RCE",
"remark": "A zero-day vulnerability with the identifier CVE-2023-36884 surfaced, posing a severe threat to Microsoft Windows and Office products. Cyber attackers have already initiated targeted attacks against government and defense organizations in Europe and North America, making it a matter of utmost concern for the security community.",
"url": "https://www.darkrelay.com/post/cve-2023-36884-office-zero-day-rce"
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": true,
"name": "Account Takeover vulnerability in ChatGPT",
"remark": "A severe security vulnerability discovered in ChatGPT that allowed an attacker to take over any user's account with a single click, giving them access to sensitive information and the ability to perform unauthorized actions.",
"url": "https://example.com"
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": true,
"name": "Thick Client Penetration Testing: Uncovering Vulnerabilities in Desktop Applications",
"remark": "This thick client penetration testing blog series aims to educate pen testers on Windows thick client application security testing. We will use DarkRelay's vulnerable Windows application for PoC and testing. ",
"url": "https://www.darkrelay.com/post/thick-client-penetration-testing"
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": false,
"name": "Buffer Overflow exploitation",
"remark": "This course offers a practical introduction to buffer overflow exploitation, covering x86 architecture, exploit prevention techniques, fuzzing, and exploiting vulnerabilities on Windows and Linux. Designed for those with basic programming and OS knowledge, it provides essential skills for ethical hacking and vulnerability research.",
"url": "https://www.darkrelay.com/challenge-page/bufferoverflow?programId=6d1626da-1717-474f-b05c-d88cc09489c4"
}
6 changes: 6 additions & 0 deletions data/00-general/training/0002-Certified-AppSec-Pentester.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": true,
"name": "Certified AppSec Pentester (CAPen) - secops",
"remark": "Certified AppSec Pentester (CAPen) is an intermediate-level exam to test a candidate’s knowledge on the core concepts involving application security. Candidates must be able to demonstrate practical knowledge to conduct an application pentest to pass this exam.",
"url": "https://secops.group/product/certified-appsec-pentester/"
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": true,
"name": "Buffer Overflow Exploits and Defenses",
"remark": " In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling, mitigation approaches, and return-oriented programming.",
"url": "https://ocw.mit.edu/courses/6-858-computer-systems-security-fall-2014/resources/lecture-3-buffer-overflow-exploits-and-defenses/"
}
6 changes: 6 additions & 0 deletions data/00-general/websites/0016-php-security.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": true,
"name": "PHP Security",
"remark": "PHP Manual",
"url": "https://www.php.net/manual/en/security.php"
}
6 changes: 6 additions & 0 deletions data/00-general/websites/0017-portswigger-web-academy.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": true,
"name": "Portswigger Web Academy",
"remark": "Free, online web security training from the creators of Burp Suite",
"url": "https://portswigger.net/web-security"
}
6 changes: 6 additions & 0 deletions data/00-general/websites/01-wiki-pages/0002-appsec-wiki.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": true,
"name": "Appsec wiki",
"remark": "Application Security Wiki is an initiative to provide all Application security related resources to Security Researchers and developers at one place.",
"url": "https://appsecwiki.com/"
}
6 changes: 6 additions & 0 deletions data/00-general/websites/02-tools/0005.JWack.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": true,
"name": "JWack",
"remark": "JWack is a powerful security tool designed for interacting with JSON Web Tokens (JWT).",
"url": "https://github.com/offen5iv3/JWack"
}
6 changes: 6 additions & 0 deletions data/AWS/0001-AWS-Penetration-Testing.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": false,
"name": "AWS Penetration Testing",
"remark": "An AWS penetration testing online course and program will teach you the skills and knowledge you need to conduct penetration tests on AWS environments. This includes learning about the AWS infrastructure, the different types of AWS services, and the common security vulnerabilities associated with AWS.",
"url": "https://www.darkrelay.com/challenge-page/awspentest?programId=6fd8fcb3-ae72-4c07-912e-bffa49b13e20"
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": false,
"name": "Mastering Android Application Penetration Testing (MAPT)",
"remark": "Dive deep into Android security through this expansive training program to equip you with critical skills for defending Android applications from sophisticated cyber threats. Learn the latest techniques and tools to uncover vulnerabilities, exploit security gaps, and safeguard sensitive data.",
"url": "https://www.darkrelay.com/challenge-page/android-application-penetration-testing?programId=0a27eec7-197a-4efe-8032-955980e7a85c"
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": false,
"name": "Advanced Mobile Application Security (AMAS)",
"remark": "Master mobile app security with this hands-on course focusing on Android and iOS platforms. Learn to identify, exploit, and mitigate vulnerabilities through reverse engineering, runtime manipulation, and secure coding practices. Designed for cybersecurity professionals, developers, and pentesters, this course equips you to perform comprehensive security assessments and defend against advanced mobile threats.",
"url": "https://www.darkrelay.com/challenge-page/advanced-mobile-application-security?programId=d8334ef1-d926-4f9c-bdbd-bcf16c50d6b9"
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": true,
"name": "Mobile Application Penetration Testing - TCM security",
"remark": "Learn Mobile Application Hacking for iOS and Android Devices",
"url": "https://academy.tcm-sec.com/p/mobile-application-penetration-testing"
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"free": false,
"name": "Widnows Thick Client Penetration Testing.",
"remark": "Thick Client Penetration Testing (TPT) course to understand the methodologies, tools, and techniques required for assessing the security of Windows thick client applications.",
"url": "https://www.darkrelay.com/challenge-page/thick-client-penetration-testing?programId=4815786f-f9ab-40b0-9a18-35197e4d3843"
}