A knowledge base of best practices for application security
☆29Aug 10, 2023Updated 2 years ago
Alternatives and similar repositories for application-security-handbook
Users that are interested in application-security-handbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Apr 6, 2024Updated last year
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated last year
- AWS Lambda function with Pandas, Sklearn, Scipy, Numpy and Chainer☆15Oct 14, 2016Updated 9 years ago
- Deploy Microsoft Healthcare Bot Reference Architecture.☆16Apr 1, 2020Updated 5 years ago
- Insecure Android Application for testing Biometric bypasses☆15Aug 5, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- scikit-learn: machine learning in Python☆17Oct 16, 2021Updated 4 years ago
- Files used for various testing methodologies.☆12Mar 16, 2026Updated last week
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- A Kubernetes service reverse proxy that requires no configuration☆13Oct 4, 2015Updated 10 years ago
- Large scale server deploys using BitTorrent and the BitTornado library☆11Sep 25, 2018Updated 7 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- tak is a benchmark thing 👍 (or maybe just an excuse to collect all the languages)☆14Oct 24, 2025Updated 5 months ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- Burp Suite extension for parsing Swagger web service definition files☆19Jul 15, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PoC of CVE-2022-22978 vulnerability in Spring Security framework☆12Jun 4, 2022Updated 3 years ago
- Popcorn - the JSON fuzzer☆22Jul 27, 2014Updated 11 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- Chameleon Wordlists☆15Sep 13, 2022Updated 3 years ago
- Collection of Helm charts that developed by the BeeInventor.☆10Feb 20, 2025Updated last year
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 11 years ago
- Singer.io tap for extracting data from the Slack Web API☆12Dec 18, 2025Updated 3 months ago
- ☆10Feb 21, 2023Updated 3 years ago
- macOS/OSX hash dump script taken from Empire framework☆13Oct 19, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Feb 26, 2025Updated last year
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- StrandHogg Task Injection POC☆32Dec 27, 2019Updated 6 years ago
- IREE compiler and runtime for Snitch☆14Oct 9, 2025Updated 5 months ago
- ☆12Sep 11, 2022Updated 3 years ago
- OBSOLETE: USE `simple-stack` instead!☆22Feb 11, 2023Updated 3 years ago
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆21Mar 11, 2026Updated 2 weeks ago
- Animation of Yves Lafont's Interaction Combinators☆23Jan 30, 2022Updated 4 years ago
- Labs from our workshop "Demystifying the server-side".☆17May 30, 2022Updated 3 years ago
- Attentional Mechanism incorporated in Asynchronous Advantage Actor Critic a3c/a2c deep mind☆10Jan 9, 2018Updated 8 years ago
- Docker image that provides features similar to Burp Collaborator☆15Mar 6, 2021Updated 5 years ago
- A mempool listener for contract specific transactions.☆13Aug 19, 2024Updated last year
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control…☆36Dec 15, 2025Updated 3 months ago