References
References
Book Cover By: Dominik Mayer
Threat Matrix
https://fight.mitre.org/matrix/
https://spaceshield.esa.int/
https://attack.mitre.org/matrices/enterprise/
https://www.microsoft.com/en-us/security/blog/2023/04/06/devops-threat-matrix/
https://www.microsoft.com/en-us/security/blog/2020/04/02/attack-matrix-kubernetes/
Cloud
https://github.com/Hacking-the-Cloud/hackingthe.cloud/
https://github.com/six2dez/pentest-book/tree/master/enumeration/cloud
IOT
https://github.com/ahmedalroky/IOT-hacking-Roadmap
https://github.com/fkie-cad/awesome-embedded-and-iot-security
https://github.com/CyberSecurityUP/Awesome-Hardware-and-IoT-Hacking
https://github.com/nutc4k3/amazing-iot-security
https://github.com/ahmedalroky/IOT-hacking-Roadmap
https://owasp.org/www-chapter-pune/meetups/2019/August/IoT_Device_Pentest_by_Shubham_Chougule.pdf
https://github.com/scriptingxss/owasp-fstm
Last updated