Material from presentations done by GoSecure researchers
☆34Oct 10, 2023Updated 2 years ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- Minimalist cheat sheet for developpers to write secure code☆54Jul 17, 2020Updated 5 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Mar 22, 2022Updated 3 years ago
- Workshop given at Hack in Paris 2019☆126Jun 8, 2023Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆73May 3, 2021Updated 4 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- Challenges and other resources for magpieCTF 2021.☆19Jul 29, 2022Updated 3 years ago
- Extract domains/subdomains/FQDNs from files and URLs☆19Jun 30, 2020Updated 5 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- A collection of my answers to the exercises in Modern Cryptography: Theory and Practice by Wenbo Mao☆10Oct 8, 2017Updated 8 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- A monitoring hub that watches popular open-source repositories and uses AI to detect when commits are patching security vulnerabilities -…☆82Updated this week
- Index all certificates from certificate transparancy into Elasticsearch☆22Nov 22, 2017Updated 8 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 8 years ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 4 years ago
- a simple wii homebrew application demonstrating a simple gba input viewer☆11Apr 22, 2016Updated 9 years ago
- Dynamic Identification and Recognition Technology☆10Nov 1, 2016Updated 9 years ago
- Transcribe Greek text to Latin alphabet using the ISO 843:1997 standard (also known as ELOT 743:1987)☆13Oct 12, 2022Updated 3 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- This repository contains complete source code for setting up the environment and exploit code for the vulnerability.☆19Mar 23, 2023Updated 2 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- Hackable website for teaching/training purposes. Includes my undergraduate thesis.☆14Mar 7, 2018Updated 8 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- Exposing phishing kits, creators and malicious actors.☆52Dec 6, 2022Updated 3 years ago
- Who wants to be millionaire game made with MEAN (MongoDB, Express, Angularjs, Nodejs)☆11Mar 27, 2018Updated 7 years ago
- Repository to showcase various configuration recipes with various technologies☆36Dec 16, 2022Updated 3 years ago
- Sample app to go with "Web Developers' HTTP Toolbox" workshop☆13Feb 26, 2019Updated 7 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- ☆10Sep 11, 2021Updated 4 years ago
- Module to load WebAssembly files into ghidra☆102Jun 10, 2020Updated 5 years ago
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 6 months ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago