0xn3va / application-security-handbookView external linksLinks
A knowledge base of best practices for application security
☆29Aug 10, 2023Updated 2 years ago
Alternatives and similar repositories for application-security-handbook
Users that are interested in application-security-handbook are comparing it to the libraries listed below
Sorting:
- Task management for small-group organizers.☆18Jul 23, 2022Updated 3 years ago
- Read and write Mifare1K tags in Javascript☆13Sep 21, 2017Updated 8 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Singer.io tap for extracting data from the Slack Web API☆11Dec 18, 2025Updated last month
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- Files used for various testing methodologies.☆13Mar 6, 2017Updated 8 years ago
- The behavioural indexer for Ethereum.☆13Jun 13, 2024Updated last year
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Jan 8, 2026Updated last month
- macOS/OSX hash dump script taken from Empire framework☆13Oct 19, 2018Updated 7 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 10 months ago
- A tool to keep utility scripts neatly organized.☆14Jan 2, 2026Updated last month
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Okta MCP Server☆20Aug 19, 2025Updated 5 months ago
- ☆17Dec 14, 2025Updated last month
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- ☆13Jan 17, 2020Updated 6 years ago
- Analysis of the major exploits that took place on the Ethereum blockchain☆17Oct 31, 2022Updated 3 years ago
- About Learning and building LLM application using Langchain 🦜🔗 and Open AI☆11Jul 13, 2023Updated 2 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- Insecure Android Application for testing Biometric bypasses☆15Aug 5, 2022Updated 3 years ago
- The most comprehensive directory of blockchain data providers on the internet.☆12Aug 23, 2025Updated 5 months ago
- ☆18Sep 29, 2023Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- a noir library for multiparty computation primitives☆18Feb 5, 2026Updated last week
- Curated index of applications for Software Boutique 2.0☆12Apr 3, 2024Updated last year
- PoC of CVE-2022-22978 vulnerability in Spring Security framework☆12Jun 4, 2022Updated 3 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- Chameleon Wordlists☆15Sep 13, 2022Updated 3 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- Deploy Microsoft Healthcare Bot Reference Architecture.☆16Apr 1, 2020Updated 5 years ago
- Ansible playbook of yum repository for centos.☆35Apr 13, 2014Updated 11 years ago
- A python reverse shell☆18May 9, 2022Updated 3 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- Solutions to the Capture The Ether CTF challenges ⛳️☆15Oct 9, 2023Updated 2 years ago
- A Bootstrap Stencil for Pencil☆16Feb 19, 2015Updated 10 years ago
- Write acceptance tests easily for your CLI program.☆21Nov 25, 2023Updated 2 years ago