Exploit Cve 2016 10033PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container
Stars: ✭ 356 (-55.44%)
CoordinatorImplementation of Coordinators app design pattern.
Stars: ✭ 616 (-22.9%)
Viabus Architecture让 Android 开发可以像流水线一样高效的,职责分离架构 ⚡ 不同于 MVP 的配置解耦,也不能和 似是而非 的 MVVM - Clean 同日而语。VIABUS 是世界范围内首个明确提出,通过职责分离,来真正实现 UI 和 业务并行开发的 Android 项目级开发架构和设计模式理念。
Stars: ✭ 485 (-39.3%)
Pentest LabPentest Lab on OpenStack with Heat, Chef provisioning and Docker
Stars: ✭ 353 (-55.82%)
Easy Linux PwnA set of Linux binary exploitation tasks for beginners on various architectures
Stars: ✭ 353 (-55.82%)
PwndbgExploit Development and Reverse Engineering with GDB Made Easy
Stars: ✭ 4,178 (+422.9%)
Bullet🚅 Interactive prompts made simple. Build a prompt like stacking blocks.
Stars: ✭ 3,257 (+307.63%)
HvmiHypervisor Memory Introspection Core Library
Stars: ✭ 438 (-45.18%)
The holy book of x86A simple guide to x86 architecture, assembly, memory management, paging, segmentation, SMM, BIOS....
Stars: ✭ 577 (-27.78%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (-45.56%)
PillmanPillman boot sector game, a yellow thing eats pills and is chased by monsters.
Stars: ✭ 298 (-62.7%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (-8.89%)
Spectre AttackExample of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Stars: ✭ 690 (-13.64%)
Cve 2019 07083389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
Stars: ✭ 350 (-56.2%)
ModulithsBuilding modular, monolithic applications using Spring Boot
Stars: ✭ 478 (-40.18%)
JmoleculesLibraries to help developers express architectural abstractions in Java code
Stars: ✭ 348 (-56.45%)
BadmodCMS auto detect and exploit.
Stars: ✭ 296 (-62.95%)
Aofe.code《前端架构:从入门到微前端》源码,code for Architecture of Frontend
Stars: ✭ 292 (-63.45%)
Solution ArchitectureSolution Architecture links, articles, books, video lessons, etc.
Stars: ✭ 289 (-63.83%)
Jupyter pivottablejsDrag’n’drop Pivot Tables and Charts for Jupyter/IPython Notebook, care of PivotTable.js
Stars: ✭ 428 (-46.43%)
DissectionThe dissection of a simple "hello world" ELF binary.
Stars: ✭ 427 (-46.56%)
Hackermind渗透步骤,web安全,CTF,业务安全,人工智能,区块链安全,安全开发,无线安全,社会工程学,二进制安全,移动安全,红蓝对抗,运维安全,风控安全,linux安全
Stars: ✭ 284 (-64.46%)
Ink🌈 React for interactive command-line apps
Stars: ✭ 17,505 (+2090.86%)
BrutesploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (-46.93%)
System designPreparation links and resources for system design questions
Stars: ✭ 7,170 (+797.37%)
Ictf FrameworkThe iCTF Framework, presented by Shellphish!
Stars: ✭ 281 (-64.83%)
Go Clean ArchGo (Golang) Clean Architecture based on Reading Uncle Bob's Clean Architecture
Stars: ✭ 5,128 (+541.8%)
PlasmaPlasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
Stars: ✭ 2,956 (+269.96%)
Damn Vulnerable Graphql ApplicationDamn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Stars: ✭ 567 (-29.04%)
AvengingMVP pattern example on Android: no Dagger or RxJava example
Stars: ✭ 279 (-65.08%)
YsoserialA proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Stars: ✭ 4,808 (+501.75%)
CleanaspnetcorewebapiStarter project for creating APIs built on ASP.NET Core using clean architecture.
Stars: ✭ 279 (-65.08%)
SpoilerwallSpoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
Stars: ✭ 754 (-5.63%)
Lumie✨ An opinionated way to keep your express API organized
Stars: ✭ 277 (-65.33%)
CyphernodeModular Bitcoin full-node microservices API server architecture and utilities toolkit to build scalable, secure and featureful apps and services without trusted third parties
Stars: ✭ 273 (-65.83%)
Ctf weba project aim to collect CTF web practices .
Stars: ✭ 564 (-29.41%)
KeyloggerKeylogger is 100% invisible keylogger not only for users, but also undetectable by antivirus software. Blackcat keylogger Monitors all keystokes, Mouse clicks. It has a seperate process which continues capture system screenshot and send to ftp server in given time.
Stars: ✭ 271 (-66.08%)
BotbA container analysis and exploitation tool for pentesters and engineers.
Stars: ✭ 414 (-48.19%)
Cve 2019 1003000 Jenkins Rce PocJenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
Stars: ✭ 270 (-66.21%)
Writeups国内各大CTF赛题及writeup整理
Stars: ✭ 651 (-18.52%)
Commodity Injection SignaturesCommodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT
Stars: ✭ 267 (-66.58%)
Swiftui ArchitecturesThree different architectures (Model-View, Redux, MVVM) for using SwiftUI implemented at the example of a chat app
Stars: ✭ 413 (-48.31%)
KrfA kernelspace syscall interceptor and randomized faulter
Stars: ✭ 267 (-66.58%)
MixinMixin is a trait/mixin and bytecode weaving framework for Java using ASM
Stars: ✭ 557 (-30.29%)
Github CornersA fresher "Fork me on GitHub" callout.
Stars: ✭ 4,583 (+473.59%)
PvmBuild workflows, activities, BPMN like processes, or state machines with PVM.
Stars: ✭ 348 (-56.45%)
AttifyosAttify OS - Distro for pentesting IoT devices
Stars: ✭ 615 (-23.03%)
Juice ShopOWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+684.73%)
Micro Frontendsextending the microservice paradigms to web development
Stars: ✭ 3,862 (+383.35%)
LuffyAndroid字节码插件,编译期间动态修改代码,改造添加全埋点日志采集功能模块,对常见控件进行监听处理
Stars: ✭ 347 (-56.57%)
Thc ArchiveAll releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-40.68%)