Java Notes📚 计算机科学基础知识、Java开发、后端/服务端、面试相关 📚 computer-science/Java-development/backend/interview
Stars: ✭ 1,284 (+1026.32%)
UnqliteAn Embedded NoSQL, Transactional Database Engine
Stars: ✭ 1,583 (+1288.6%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (+1096.49%)
NeedleThe iOS Security Testing Framework
Stars: ✭ 1,122 (+884.21%)
Dependency spyFind known vulnerabilities in your dependencies
Stars: ✭ 87 (-23.68%)
Fwdsh3llForward shell generation framework
Stars: ✭ 62 (-45.61%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-45.61%)
DefqlCreate elixir functions with SQL as a body.
Stars: ✭ 100 (-12.28%)
On PwningMy solutions to some CTF challenges and a list of interesting resources about pwning stuff
Stars: ✭ 87 (-23.68%)
Harbor Scanner TrivyUse Trivy as a plug-in vulnerability scanner in the Harbor registry
Stars: ✭ 62 (-45.61%)
Watf BankWaTF Bank - What a Terrible Failure Mobile Banking Application for Android and iOS
Stars: ✭ 87 (-23.68%)
HermitdbA private decentralized database replicated over Git (or any other distributed log)
Stars: ✭ 61 (-46.49%)
Mssql DockerOfficial Microsoft repository for SQL Server in Docker resources
Stars: ✭ 1,111 (+874.56%)
NextDirectus is a real-time API and App dashboard for managing SQL database content. 🐰
Stars: ✭ 111 (-2.63%)
Gda Android Reversing ToolGDA is a new fast and powerful decompiler in C++(working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy leaking detection, vulnerability detection, path solving, packer identification, variable tracking, deobfuscation, python&java scripts, device memory extraction, dat…
Stars: ✭ 2,332 (+1945.61%)
Datastore🐹 Bloat free and flexible interface for data store and database access.
Stars: ✭ 99 (-13.16%)
PaxosstorePaxosStore has been deployed in WeChat production for more than two years, providing storage services for the core businesses of WeChat backend. Now PaxosStore is running on thousands of machines, and is able to afford billions of peak TPS.
Stars: ✭ 1,278 (+1021.05%)
SkunkA data access library for Scala + Postgres.
Stars: ✭ 1,107 (+871.05%)
LayrDramatically simplify full‑stack development
Stars: ✭ 1,111 (+874.56%)
BlackratBlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-23.68%)
Neo4j GraphqlAn optimized neo4j query resolver for Facebook's GraphQL
Stars: ✭ 60 (-47.37%)
Sap exploitHere you can get full exploit for SAP NetWeaver AS JAVA
Stars: ✭ 60 (-47.37%)
PyhawkSearches the directory of choice for interesting files. Such as database files and files with passwords stored on them
Stars: ✭ 60 (-47.37%)
RedsnarfRedSnarf is a pen-testing / red-teaming tool for Windows environments
Stars: ✭ 1,109 (+872.81%)
Ten34A globally-distributed, eventually-consistent, 100% available key-value store ;)
Stars: ✭ 87 (-23.68%)
FuxiPenetration Testing Platform
Stars: ✭ 1,103 (+867.54%)
Pg stat kcacheGather statistics about physical disk access and CPU consumption done by backends.
Stars: ✭ 106 (-7.02%)
PgcliPostgres CLI with autocompletion and syntax highlighting
Stars: ✭ 9,985 (+8658.77%)
RestfeelRESTFeel: 一个企业级的API管理&测试平台。RESTFeel帮助你设计、开发、测试您的API。
Stars: ✭ 59 (-48.25%)
Bitp0wnAlgorithms to re-compute a private key, to fake signatures and some other funny things with Bitcoin.
Stars: ✭ 59 (-48.25%)
RmariadbAn R interface to MariaDB
Stars: ✭ 86 (-24.56%)
VulnwhispererCreate actionable data from your Vulnerability Scans
Stars: ✭ 1,102 (+866.67%)
MycliA Terminal Client for MySQL with AutoCompletion and Syntax Highlighting.
Stars: ✭ 10,059 (+8723.68%)
CdkCDK is an open-sourced container penetration toolkit, offering stable exploitation in different slimmed containers without any OS dependency. It comes with penetration tools and many powerful PoCs/EXPs helps you to escape container and takeover K8s cluster easily.
Stars: ✭ 1,264 (+1008.77%)
Sql.jsA javascript library to run SQLite on the web.
Stars: ✭ 9,594 (+8315.79%)
DoltDolt – It's Git for Data
Stars: ✭ 9,880 (+8566.67%)
ElectrocrudDatabase CRUD Application Built on Electron | MySQL, Postgres, SQLite
Stars: ✭ 1,267 (+1011.4%)
NoisepageSelf-Driving Database Management System from Carnegie Mellon University
Stars: ✭ 1,095 (+860.53%)
Reinforced.tectureAspect-based architectural framework for .NET business applications involving some FP and CQRS principles.
Stars: ✭ 113 (-0.88%)
BellaBella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Stars: ✭ 112 (-1.75%)
Spring Data MockMock facility for Spring Data repositories
Stars: ✭ 110 (-3.51%)
Lyrics 📄 Open Lyrics Database
Stars: ✭ 106 (-7.02%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+8554.39%)
Db DashboardProject files of the article featured here: http://db.rstudio.com/best-practices/dashboards/
Stars: ✭ 58 (-49.12%)
Squid🦑 Provides SQL tagged template strings and schema definition functions.
Stars: ✭ 57 (-50%)
Couchbase Lite CC language bindings for the Couchbase Lite embedded NoSQL database engine
Stars: ✭ 58 (-49.12%)
Typeorm LoaderA database-aware data-loader for use with GraphQL and TypeORM.
Stars: ✭ 86 (-24.56%)
Docker Backup DatabaseDocker image to periodically backup your database (MySQL, Postgres, or MongoDB) to S3 or local disk.
Stars: ✭ 57 (-50%)
ZookeeperApache ZooKeeper
Stars: ✭ 10,061 (+8725.44%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-24.56%)
CrawlergoA powerful dynamic crawler for web vulnerability scanners
Stars: ✭ 1,088 (+854.39%)
Kill RouterFerramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-50%)