GrypeA vulnerability scanner for container images and filesystems
Stars: ✭ 362 (-87.92%)
Ossf Cve BenchmarkThe OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebases using a variety of static analysis security testing (SAST) tools and generate reports to evaluate those tools.
Stars: ✭ 71 (-97.63%)
Flutter TutorialsThe repo contains the source code for all the tutorials on the FilledStacks Youtube channel.
Stars: ✭ 4,115 (+37.35%)
2018 19 Classeshttps://cc-mnnit.github.io/2018-19-Classes/ - 🎒 💻 Material for Computer Club Classes
Stars: ✭ 119 (-96.03%)
Processing DocsProcessing reference, examples, tutorials, and website
Stars: ✭ 346 (-88.45%)
Jira ScanCVE-2017-9506 - SSRF
Stars: ✭ 159 (-94.69%)
RbndrSimple DNS Rebinding Service
Stars: ✭ 343 (-88.55%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (-61.28%)
BxssbXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.
Stars: ✭ 331 (-88.95%)
GreconYour Google Recon is Now Automated
Stars: ✭ 119 (-96.03%)
Offensive DockerOffensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (-89.05%)
Fish detectionFish detection using Open Images Dataset and Tensorflow Object Detection
Stars: ✭ 67 (-97.76%)
Iblessingiblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (-89.12%)
Go HardwareA directory of hardware related libs, tools, and tutorials for Go
Stars: ✭ 1,137 (-62.05%)
SafilerSafari local file reader
Stars: ✭ 118 (-96.06%)
ThinkdiffMy open source project links, programming and software development related code and tutorials are in this repo. Content types: Python, JavaScript, Dart | Django, React, Flutter, React-Native etc.
Stars: ✭ 65 (-97.83%)
Findom XssA fast DOM based XSS vulnerability scanner with simplicity.
Stars: ✭ 310 (-89.65%)
Burp Retire JsBurp/ZAP/Maven extension that integrate Retire.js repository to find vulnerable Javascript libraries.
Stars: ✭ 157 (-94.76%)
Vulnerability Data ArchiveWith the hope that someone finds the data useful, we periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
Stars: ✭ 63 (-97.9%)
Boost CookbookOnline examples from "Boost C++ Application Development Cookbook":
Stars: ✭ 306 (-89.79%)
XvwaXVWA is intentionally designed with many security flaws and enough technical ground to upskill application security knowledge. This whole idea is to evangelize web application security issues. Do let us know your suggestions for improvement or any more vulnerability you would like to see in XVWA future releases.
Stars: ✭ 1,540 (-48.6%)
OppiaA free, online learning platform to make quality education accessible for all.
Stars: ✭ 4,361 (+45.56%)
Attack Surface Detector BurpThe Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Stars: ✭ 63 (-97.9%)
JaadasJoint Advanced Defect assEsment for android applications
Stars: ✭ 304 (-89.85%)
Cve Check ToolOriginal Automated CVE Checking Tool
Stars: ✭ 172 (-94.26%)
SonarsearchA MongoDB importer and API for Project Sonars DNS datasets
Stars: ✭ 297 (-90.09%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-97.93%)
H2csmugglerHTTP Request Smuggling over HTTP/2 Cleartext (h2c)
Stars: ✭ 292 (-90.25%)
QuickxssAutomating XSS using Bash
Stars: ✭ 113 (-96.23%)
VbscanOWASP VBScan is a Black Box vBulletin Vulnerability Scanner
Stars: ✭ 295 (-90.15%)
S3reverseThe format of various s3 buckets is convert in one format. for bugbounty and security testing.
Stars: ✭ 61 (-97.96%)
Jsfscan.shAutomation for javascript recon in bug bounty.
Stars: ✭ 287 (-90.42%)
Awesome Pytorch ListA comprehensive list of pytorch related content on github,such as different models,implementations,helper libraries,tutorials etc.
Stars: ✭ 12,475 (+316.39%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+13.18%)
Sap exploitHere you can get full exploit for SAP NetWeaver AS JAVA
Stars: ✭ 60 (-98%)
LazyreconAn automated approach to performing recon for bug bounty hunting and penetration testing.
Stars: ✭ 282 (-90.59%)
Awesome Jamstack📔 Curated list of resources: books, videos, articles, speaker decks, tools about using the JAMstack (A modern web development architecture for creating fast, secure and dynamic websites)
Stars: ✭ 115 (-96.16%)
Storytelling With DataCourse materials for Dartmouth Course: Storytelling with Data (PSYC 81.09).
Stars: ✭ 59 (-98.03%)
Recon PipelineAn automated target reconnaissance pipeline.
Stars: ✭ 278 (-90.72%)
DvhmaDamn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.
Stars: ✭ 180 (-93.99%)
Docs🎓 Collection of useful PHP frequently asked questions, articles and best practices
Stars: ✭ 275 (-90.82%)
VulnwhispererCreate actionable data from your Vulnerability Scans
Stars: ✭ 1,102 (-63.22%)
BuildapksReally quickly build APKs on handheld device (smartphone and tablet) in Amazon, Android, Chromebook, PRoot and Windows📲 See https://buildapks.github.io/docsBuildAPKs/setup to start building APKs.
Stars: ✭ 272 (-90.92%)
GxssA tool to check a bunch of URLs that contain reflecting params.
Stars: ✭ 115 (-96.16%)
Hottbox Tutorials📙 HOTTBOX: Higher Order Tensors ToolBOX. Tutorials
Stars: ✭ 29 (-99.03%)
Fuzz.txtPotentially dangerous files
Stars: ✭ 1,382 (-53.87%)
TakeoverA tool for testing subdomain takeover possibilities at a mass scale.
Stars: ✭ 28 (-99.07%)
GogitdumperDump exposed HTTP .git fast
Stars: ✭ 27 (-99.1%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-95.06%)
Gold Miner🥇掘金翻译计划,可能是世界最大最好的英译中技术社区,最懂读者和译者的翻译平台:
Stars: ✭ 29,872 (+897.06%)