Measuring LLM's ability to find vulnerabilities, massive collection of APT reports, how to get started in memory corruption & exploitation
Interview resources, >55 talks on AI and more, a GitHub Action to limit data exfiltration
>40 awesome CloudSec talks, finding vulns with LLMs, how to use Burp like a pro
AppSec and Threat Detection interview q's, tools and tips to secure your Snowflake environment, tools to test LLMs
Queries to look for attackers in your Snowflake, AWS queries to use during incidents, how OpenAI and Apple secure AI workloads
Practical resources for offensive CI/CD research, AI threat modeling tool, bypassing CloudTrail through non-prod endpoints
Repo of detection engineering resources, Jason Haddix's security GPTs, 3 successful founders on building a security company
Subtly tamper with GHA builds, repo with offense-focused Rust PoCs, how to prioritize a detection backlog
Understanding & detecting the XZ Utils backdoor, CISA's repo of enriched CVEs, an example SOC 2 compliant GitHub CI/CD pipeline