References

References

Book Cover By: Dominik Mayer

Threat Matrix

  • https://fight.mitre.org/matrix/

  • https://spaceshield.esa.int/

  • https://attack.mitre.org/matrices/enterprise/

  • https://www.microsoft.com/en-us/security/blog/2023/04/06/devops-threat-matrix/

  • https://www.microsoft.com/en-us/security/blog/2020/04/02/attack-matrix-kubernetes/

Cloud

  • https://github.com/Hacking-the-Cloud/hackingthe.cloud/

  • https://github.com/six2dez/pentest-book/tree/master/enumeration/cloud

IOT

  • https://github.com/ahmedalroky/IOT-hacking-Roadmap

  • https://github.com/fkie-cad/awesome-embedded-and-iot-security

  • https://github.com/CyberSecurityUP/Awesome-Hardware-and-IoT-Hacking

  • https://github.com/nutc4k3/amazing-iot-security

  • https://github.com/ahmedalroky/IOT-hacking-Roadmap

  • https://owasp.org/www-chapter-pune/meetups/2019/August/IoT_Device_Pentest_by_Shubham_Chougule.pdf

  • https://github.com/scriptingxss/owasp-fstm

Last updated