☆35Oct 28, 2021Updated 4 years ago
Alternatives and similar repositories for ConferenceTalks
Users that are interested in ConferenceTalks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An invoice management application built on the MEAN stack with intentional vulnerabilities used to demonstrate insecure configurations an…☆16Sep 4, 2020Updated 5 years ago
- ☆16Oct 3, 2018Updated 7 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆82Feb 4, 2023Updated 3 years ago
- TSLint rules for Angular☆18Nov 30, 2018Updated 7 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A repository for GraphQL Extension for Burp Suite☆57Oct 31, 2018Updated 7 years ago
- 🦄 A frameworkless API in Node.js☆12Mar 14, 2019Updated 7 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- Patches the popular rooting framework SuperSU to evade common root detections. This is done by renaming binaries / references to break si…☆48Jul 24, 2021Updated 4 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients usin…☆12Jun 23, 2020Updated 5 years ago
- Codice degli esempi mostrati nella playlist "Java EE in Italiano" su YouTube☆12Oct 18, 2020Updated 5 years ago
- Lint your Rego policies inside of Visual Studio Code☆16Jun 16, 2024Updated last year
- Provides CRUD utilities for AdminFaces based applications.☆13Feb 9, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆36Aug 7, 2020Updated 5 years ago
- A simple scavenger hunt to learn about pentesting a website or web application.☆16Feb 12, 2026Updated 2 months ago
- Node.js CLI to get a preview of properties and files that will be published on the NPM registry☆20Mar 29, 2026Updated last month
- Write acceptance tests easily for your CLI program.☆21Nov 25, 2023Updated 2 years ago
- Secure Contexts, but with _more_ secureness!☆20May 1, 2024Updated 2 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- Instructions for setting up Kerberos, Zookeeper, and Kafka with SASL☆16Jan 22, 2018Updated 8 years ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆16Jan 5, 2020Updated 6 years ago
- ☆25Oct 17, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Depstubber generates type-correct stubs for Go dependencies, for use in testing☆17Mar 21, 2025Updated last year
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- A tail(1)-like utility for nginx log files that supports parsing, filtering and formatting individual log lines.☆39Mar 14, 2014Updated 12 years ago
- A collection of scripts to extend Burp Suite☆142Apr 8, 2019Updated 7 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago
- This is a demo project for the SecTester JS SDK framework, with some installation and usage examples.☆17Mar 30, 2026Updated last month
- Fold your Python docstrings☆19Jan 20, 2018Updated 8 years ago
- ☆12Aug 16, 2022Updated 3 years ago
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A proxy designed to lie.☆25Jan 26, 2013Updated 13 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Nov 19, 2018Updated 7 years ago
- ☆11Oct 19, 2018Updated 7 years ago
- o lua m'lua☆12May 27, 2024Updated last year
- Cookies should take scheme into account, just like every other storage mechanism on the web.☆16Apr 18, 2020Updated 6 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Feb 12, 2020Updated 6 years ago
- A zoo for malicious NPM packages☆20Dec 8, 2022Updated 3 years ago