Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/paulveillard/cybersecurity-exploits
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Software Exploits in Cybersecurity.
https://github.com/paulveillard/cybersecurity-exploits
exploit
Last synced: about 2 months ago
JSON representation
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Software Exploits in Cybersecurity.
- Host: GitHub
- URL: https://github.com/paulveillard/cybersecurity-exploits
- Owner: paulveillard
- License: mit
- Created: 2022-11-25T15:41:24.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2022-12-08T20:24:51.000Z (about 2 years ago)
- Last Synced: 2023-03-05T02:18:47.802Z (almost 2 years ago)
- Topics: exploit
- Homepage:
- Size: 65.4 KB
- Stars: 3
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Security Exploits
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Software Exploits in Cybersecurity.
> Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources.## `What Are Exploits`
Exploit attacks are the ways hackers take advantage of weaknesses or vulnerabilities within systems.
*For example, take a hammer, a piece of wood, and a nail. The vulnerability is the soft, permeable nature of wood, and the exploit is the act of hammering the nail into the wood.*
> As a cybersecurity professional, you must understand vulnerabilities and exploits to reduce the likelihood of being compromised. In the next section, we will describe risk.
**[`^ back to top ^`](#)**
## License
MIT License & [cc](https://creativecommons.org/licenses/by/4.0/) license
This work is licensed under a Creative Commons Attribution 4.0 International License.To the extent possible under law, [Paul Veillard](https://github.com/paulveillard/) has waived all copyright and related or neighboring rights to this work.