Skip to content

My Security Article space on GitHub dedicated to sharing insights, best practices, and discussions related to cybersecurity, ensuring safer code and applications.

Notifications You must be signed in to change notification settings

okanyildiz/MySecurityArticle

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🔐 Cybersecurity Arsenal

by Okan YILDIZ

Security Research Status

Buy Me A Coffee

A comprehensive knowledge base forged from years of frontline experience in digital security

🚀 Get Started💬 Contribute📄 License


🎯 Mission Statement

"In the ever-evolving battlefield of cybersecurity, knowledge is not just power—it's survival. This repository represents years of real-world experience, late-night research, and battle-tested strategies distilled into actionable intelligence."

This collection serves security professionals, researchers, and enthusiasts who refuse to be passive in the face of digital threats. Each document is a weapon in your defensive arsenal, refined through practical application and continuous learning.


📚 Content Library

🔴 Vulnerability Analysis & Exploitation

  • Buffer Overflow - Deep dive into memory corruption vulnerabilities
  • Directory Traversal - Path manipulation attack vectors and prevention
  • File Inclusion - LFI/RFI exploitation techniques and mitigation
  • IDOR - Insecure Direct Object Reference attack patterns
  • XSS - Cross-Site Scripting: from basic to advanced payloads
  • Command Injection - OS command execution vulnerabilities

🟠 Network Security & Infrastructure

  • DNS Güvenliği ve Tünelleme Tehdidi - DNS Security and covert channel threats
  • DNS Tünelleme Aracı Kullanıcı Dokümantasyonu - Custom DNS tunneling tool documentation
  • VoIP (Voice over Internet Protocol) - Telecommunications security analysis
  • API Gateway Security - Implementation and best practices for API protection

🟡 Cloud & Enterprise Security

  • Azure Security Check List - Comprehensive Azure hardening guide
  • Active Directory Security Event Monitoring - Enterprise domain protection strategies
  • Redis Security - Complete guide for enterprise cache and data store systems

🟢 Social Engineering & Human Factors

  • Phishing, Smishing and Vishing - Anatomy of social manipulation attacks
  • Sosyal Mühendislik Saldırıları - Comprehensive social engineering tactics

🔵 Security Operations & Monitoring

  • SOME EL KİTABI - Security Operations Center (SOC) Handbook
  • Windows Event Log Analysis - Advanced threat detection and forensics
  • Advanced Threat Modeling - Methodologies for security architects

🟣 Tools & Frameworks

  • Metasploit Framework Mastery - Advanced techniques and command reference
  • Top 50 Kali Linux Tools - Essential toolkit for security professionals
  • Windows and PowerShell Commands - Cybersecurity-focused command guide
  • Essential Linux Commands - For cybersecurity specialists

🎓 What Makes This Different?

🔬 Research-Backed

Every technique documented with real-world context and practical applications

⚔️ Battle-Tested

Insights from actual penetration tests, incident responses, and security audits

🎯 Actionable

Not just theory—ready-to-implement strategies and countermeasures


🚀 Quick Start Guide

# Clone this repository
git clone [repository-url]

# Navigate to specific topics based on your interest
cd [topic-directory]

# Each document is self-contained and ready to use

Recommended Learning Path:

  1. Start with fundamentals (Buffer Overflow, XSS, Command Injection)
  2. Progress to network security (DNS Security, VoIP)
  3. Advance to enterprise solutions (Active Directory, Azure Security)
  4. Master tools and operations (Metasploit, SOC Handbook, Event Log Analysis)

💡 Contribute

Your expertise can help strengthen this knowledge base:

  • 🐛 Found an issue? Open an issue with detailed information
  • 💭 Have suggestions? Share your insights through pull requests
  • 🌟 Found it helpful? Star this repository to support the project
  • 📢 Spread the word Share with your security community

Contribution Guidelines:

  • Maintain technical accuracy and cite sources
  • Follow the existing documentation structure
  • Include practical examples where applicable
  • Respect responsible disclosure practices

📬 Connect & Follow

Stay updated with the latest security insights:


⚖️ License & Usage

Copyright © 2025 Okan YILDIZ. All Rights Reserved.

Terms of Use:

  • Educational purposes - Free to use for learning and research
  • Attribution required - Credit the source when referencing
  • Non-commercial - Personal and educational use permitted
  • No unauthorized redistribution - Respect intellectual property rights
  • No commercial use - Contact for commercial licensing

This content represents significant research and expertise. By respecting these terms, you support the continued creation of quality security resources.


⚠️ Ethical Use Disclaimer

This repository is intended for defensive security purposes and education only.

The techniques and tools documented here are provided to help security professionals:

  • Understand attack vectors to build better defenses
  • Conduct authorized penetration testing and security assessments
  • Improve organizational security posture
  • Educate and train security teams

Unauthorized access to computer systems is illegal. Always obtain proper authorization before testing security controls.


Buy Me A Coffee

🛡️ "Security is not a product, but a process. Stay vigilant, stay informed, stay secure."

Made with 🔥 and countless cups of ☕ by Okan Yıldız


Last Updated: October 2025 | Version: 2.0

About

My Security Article space on GitHub dedicated to sharing insights, best practices, and discussions related to cybersecurity, ensuring safer code and applications.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published