# References

### References

Book Cover By: Dominik Mayer

### Threat Matrix

* <https://fight.mitre.org/matrix/>
* <https://spaceshield.esa.int/>
* <https://attack.mitre.org/matrices/enterprise/>
* <https://www.microsoft.com/en-us/security/blog/2023/04/06/devops-threat-matrix/>
* <https://www.microsoft.com/en-us/security/blog/2020/04/02/attack-matrix-kubernetes/>

### Cloud

* <https://github.com/Hacking-the-Cloud/hackingthe.cloud/>
* <https://github.com/six2dez/pentest-book/tree/master/enumeration/cloud>

### IOT

* <https://github.com/ahmedalroky/IOT-hacking-Roadmap>
* <https://github.com/fkie-cad/awesome-embedded-and-iot-security>
* <https://github.com/CyberSecurityUP/Awesome-Hardware-and-IoT-Hacking>
* <https://github.com/nutc4k3/amazing-iot-security>
* <https://github.com/ahmedalroky/IOT-hacking-Roadmap>
* <https://owasp.org/www-chapter-pune/meetups/2019/August/IoT\\_Device\\_Pentest\\_by\\_Shubham\\_Chougule.pdf>
* <https://github.com/scriptingxss/owasp-fstm>
