This HTML5 document contains 316 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n52https://github.com/HaschekSolutions/0xf.at/
n18https://github.com/dsecuredcom/vhost-fuzzer/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n21https://github.com/GDATASoftwareAG/vaas/
n32https://github.com/SySS-Research/
n66https://github.com/SySS-Research/icestick-glitcher/
dchttp://purl.org/dc/elements/1.1/
n22https://github.com/SySS-Research/slig/
n8https://github.com/dsecuredcom/
n13https://github.com/user0x1337/
n72https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Ftopics%2F
n39https://docs.github.com/
n35https://docs.github.com/site-policy/privacy-policies/
n23https://github.com/login?return_to=%2FActuallySam%2F
n73https://github.com/enterprise/
n86https://github.com/login?return_to=%2Fcdpxe%2F
n12https://github.com/login?return_to=%2Fh4ckd0tm3%2F
n36https://github.com/DhanushNehru/
n93https://github.com/topics/it-security?l=
n88https://github.com/cdpxe/Network-Covert-Channels-A-University-level-Course/
n83https://github.com/sujayadkesar/
n45https://github.com/OWASP-Ruhrpott/owasp-workshop-android-pentest/
foafhttp://xmlns.com/foaf/0.1/
n44https://github.com/login?return_to=%2FOWASP-Ruhrpott%2F
n95https://github.com/login?return_to=%2Ftopic.
n69https://github.com/resources/articles/
n90https://github.com/login?return_to=%2Fellerbrock%2F
xsdhhttp://www.w3.org/2001/XMLSchema#
n34https://github.com/login?return_to=%2FSySS-Research%2F
n54https://github.com/login?return_to=%2Fpaulveillard%2F
n42https://github.com/SySS-Research/icestick-lpc-tpm-sniffer/
n59https://github.com/greyhat-academy/lists.
n47https://github.com/HaschekSolutions/0xf.
n81https://github.com/topics/it-security?o=desc&s=
n61https://github.com/l3montree-dev/
n28https://github.com/DhanushNehru/Ultimate-Cybersecurity-Resources/
n48https://github.com/login?return_to=%2FHaschekSolutions%2F0xf.
n41https://docs.github.com/en/articles/
n15https://github.com/security/
n50https://github.com/resources/
n55https://github.com/paulveillard/cybersecurity-infosec/
n40https://support.github.com?tags=
n74https://docs.github.
n63https://github.com/login?return_to=%2Fl3montree-dev%2F
n80https://github.com/ellerbrock/
n92https://docs.github.com/search-github/github-code-search/
n49https://github.com/marcrowProject/
n67https://github.com/solutions/use-case/
n85https://resources.github.com/learn/
n78https://github.com/login?return_to=%2Fsujayadkesar%2F
n62https://github.com/solutions/
n94https://github.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2Ftopics%2Fit-security&source=
n57https://github.com/login?return_to=%2FBialomazur%2F
n96https://github.com/topics/it-security?l=jupyter+
n6https://github.com/
n76http://dev.restore.ovi.cnr.it:8890/about/id/https/github.com/topics/
n19https://github.com/GDATASoftwareAG/
n20https://github.com/login?return_to=%2FGDATASoftwareAG%2F
n2http://dev.restore.ovi.cnr.it:8890/about/id/entity/https/github.com/topics/
n79https://github.com/sujayadkesar/cybersecurity-resources/
n65https://github.com/solutions/industry/
n30https://github.com/github/explore/tree/master/CONTRIBUTING.md?source=
n16https://github.com/user0x1337/CVE-2022-39227/
n51https://github.com/login?return_to=%2FmarcrowProject%2F
n71https://github.com/topics/it-security#
n87https://resources.github.
n25https://github.com/ActuallySam/
awolhttp://bblfish.net/work/atom-owl/2006-06-06/#
n9https://github.com/h4ckd0tm3/
n37https://github.com/login?return_to=%2FDhanushNehru%2F
n64https://github.com/l3montree-dev/devguard/
n38https://www.githubstatus.com/
n75https://skills.github.
siochttp://rdfs.org/sioc/ns#
n43https://github.com/marcrowProject/Bramble/
n4https://github.com/topics/
n24https://github.com/ActuallySam/Coursera-Google-IT-Support/
n31https://github.
n68https://github.com/greyhat-academy/lists.d/
n53https://github.com/paulveillard/
n46https://github.com/OWASP-Ruhrpott/
n11https://github.com/sponsors/
n5https://github.com/features/copilot/
n58https://github.com/Bialomazur/Brutus/
n7https://github.com/h4ckd0tm3/project-athena/
n56https://github.com/Bialomazur/
n82https://github.com/topics/it-security?o=asc&s=
n84https://github.com/cdpxe/
n70https://github.com/features/
n27http://dev.restore.ovi.cnr.it:8890/about/id/entity/https/github.com/topics/it-security#
n17https://github.com/login?return_to=%2Fdsecuredcom%2F
n29https://github.com/SySS-Research/icebreaker-glitcher/
n33https://docs.github.com/site-policy/github-terms/
n60https://github.com/login?return_to=%2Fgreyhat-academy%2Flists.
n91https://github.com/ellerbrock/docker-security-images/
n14https://github.com/login?return_to=%2Fuser0x1337%2F
n89https://partner.github.
Subject Item
n76:it-security
foaf:primaryTopic
n2:it-security
Subject Item
n2:it-security
dc:title
it-security · GitHub Topics · GitHub
dc:description
GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.
awol:content
n27:content
sioc:links_to
n4:steganography n4:network-security n4:learning-resources n4:curriculum n4:learn n4:learn-to-code n5:copilot-business n4:security-tools n4:online-course n6: n4:google-coursera n4:computer-science n4:jwt-token n4:nmap-scripts n4:hacktoberfest2024 n4:learning-exercise n4:php n4:hacktoberfest n4:recommendations n4:owasp n4:lpc n4:container n4:exploits n4:patterns n4:malware n4:blocklist n4:scan-tool n4:botnet n7:issues n7:pulls n6:paulveillard n4:hack n6:dsecuredcom n8:vhost-fuzzer n6:h4ckd0tm3 n4:it n4:jwt n9:project-athena n11:h4ckd0tm3 n12:project-athena n4:covert-channel n4:ctf n13:CVE-2022-39227 n4:information-security n14:CVE-2022-39227 n15:advanced-security n16:issues n4:devops n4:infrastructure n16:pulls n17:vhost-fuzzer n18:issues n4:docker n18:pulls n6:user0x1337 n19:vaas n4:mooc n20:vaas n21:issues n4:vulnerability-management n21:pulls n22:pulls n4:logo8 n4:siemens-logo n6:GDATASoftwareAG n4:learning-by-doing n4:learning n23:Coursera-Google-IT-Support n24:issues n24:pulls n4:services n4:it-support n21:discussions n4:security-vulnerability n4:g-data n6:ActuallySam n6:explore n25:Coursera-Google-IT-Support n6:events n11:explore n4:container-security n4:glitching n4:information-technology n28:pulls n4:it-security n6:cdpxe n4:cli n4:hacking-tool n4:devices n29:pulls n4:icebreaker n4:ice40up5k n4:security n30:add-description-it-security n4:cve-2022-39227 n4:penetration-testing n31:com n4:information-hiding n32:icebreaker-glitcher n4:coursera n33:github-terms-of-service n34:icebreaker-glitcher n35:github-privacy-statement n29:issues n4:iot n6:security n4:coursera-specialization n36:Ultimate-Cybersecurity-Resources n37:Ultimate-Cybersecurity-Resources n4:attacker n4:sniffer n4:malware-analysis n28:issues n6:SySS-Research n38: n32:icestick-lpc-tpm-sniffer n39: n34:icestick-lpc-tpm-sniffer n40:dotcom-footer n41:classifying-your-repository-with-topics n42:issues n43:issues n4:forensics n43:pulls n4:bramble n4:foremost n4:hacking-tools n44:owasp-workshop-android-pentest n45:issues n4:secops n45:pulls n6:l3montree-dev n4:devsecops n4:hackthebox n42:pulls n4:icestick n6:OWASP-Ruhrpott n6:DhanushNehru n4:pentesters n46:owasp-workshop-android-pentest n4:identifiers n4:ethical-hacking n4:passive-warden n11:DhanushNehru n4:sniffing n6:HaschekSolutions n47:at n48:at n4:hiding-patterns n4:open-university n4:hacktoberfest2024-accepted n4:online-class n4:active-warden n4:hackits n6:marcrowProject n4:pentest n49:Bramble n4:arp-scanner n50:whitepapers n4:dos-attack n4:pentest-tool n51:Bramble n4:hacking n4:malware-detection n52:issues n4:cybersecurity n52:pulls n4:hackit-site n4:cyber-security n4:docker-security n4:riddles n4:information-security-management n4:cve n4:security-scan n4:information-security-policies n4:antivirus n6:Bialomazur n4:cryptography n53:cybersecurity-infosec n54:cybersecurity-infosec n55:issues n55:pulls n4:brutus n32:slig n34:slig n4:penetration n22:issues n56:Brutus n57:Brutus n58:issues n58:pulls n4:cve-management n6:greyhat-academy n59:d n4:netsec n60:d n61:devguard n62:use-case n63:devguard n4:resources n4:vulnerability n64:issues n65:healthcare n65:financial-services n64:pulls n65:manufacturing n4:ice40 n34:icestick-glitcher n65:nonprofits n66:issues n67:devsecops n66:pulls n67:devops n4:ice40hx1k n67:ci-cd n68:issues n6:why-github n69:devops n68:pulls n69:security n4:defaults n69:software-development n32:icestick-glitcher n50:articles n4:cybersecurity-resources n65:government n62:industry n4:configuration n6:solutions n4:cps n69:ai n70:codespaces n70:issues n70:code-review n4:open-source n70:discussions n71:start-of-content n70:copilot n72:it-security n70:actions n31:blog n6:enterprise n6:team n4:blocklists n73:startups n70:code-search n4:pentesting n6:features n74:com n75:com n78:cybersecurity-resources n79:issues n4:fpga n79:pulls n4:data-hiding n80:docker-security-images n81:updated n62:executive-insights n82:updated n6:sponsors n6:sujayadkesar n6:readme n83:cybersecurity-resources n6:topics n84:Network-Covert-Channels-A-University-level-Course n85:pathways n6:ellerbrock n4:tool n86:Network-Covert-Channels-A-University-level-Course n87:com n88:issues n6:customer-stories n88:pulls n89:com n90:docker-security-images n6:premium-support n4:workshop n4:bugbounty n91:issues n6:pricing n4:arp-spoofing n91:pulls n4:python3 n92:understanding-github-code-search-syntax n4:container-hardening n93:go n4:infosec n4:cybersecurity-education n4:attack n6:trending n93:java n6:collections n93:shell n93:typescript n94:header n70:models n4:cybersecurity-training n4:python n95:it-security n93:python n4:android-application n4:challenge n93:html n81:stars n82:stars n81:forks n82:forks n93:php n93:c n96:notebook n93:verilog n4:exploit