MLHale / CYBR8470View external linksLinks
This repo contains a digitized version of the course content for CYBR8470 Secure Web App Development at the University of Nebraska at Omaha.
☆17Nov 4, 2024Updated last year
Alternatives and similar repositories for CYBR8470
Users that are interested in CYBR8470 are comparing it to the libraries listed below
Sorting:
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Jan 26, 2026Updated 2 weeks ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 5 months ago
- Splunk scripted input for opening a backconnect shell on a remote forwarder☆45Nov 18, 2020Updated 5 years ago
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated 3 weeks ago
- 极验验证码☆11Sep 20, 2018Updated 7 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- Lightweight, Portable, Phishing and Email Campaign Utility☆12Oct 15, 2018Updated 7 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Sep 12, 2024Updated last year
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated last year
- ☆15Jul 3, 2025Updated 7 months ago
- ☆10May 6, 2017Updated 8 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- Source code related of the articles posted in medium.com☆12Nov 2, 2020Updated 5 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Attaches your (public) SSH key to your GitHub account☆11Feb 6, 2016Updated 10 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Collection of resources for responding to the Log4j set of vulnerabilities.☆11Feb 22, 2022Updated 3 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- My blog☆10Oct 6, 2025Updated 4 months ago
- ☆20Jan 12, 2022Updated 4 years ago
- Tiny Flask app for testing HTTP calls☆11Aug 7, 2018Updated 7 years ago
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- ☆12Jun 24, 2021Updated 4 years ago
- Here you will find information and examples about the most known vulnerabilities in the Bug Bounty world! [ EN ESPAÑOL ]☆14Oct 23, 2021Updated 4 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Load your data into burp☆11Apr 26, 2023Updated 2 years ago
- ACT☆12Sep 8, 2025Updated 5 months ago
- Automated provisioning of Santoku Linux (configuration of an Ubuntu VM containing the Android development environment, including Android …☆11Mar 4, 2014Updated 11 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- Curated list of useful resources for this quarantine days☆13Mar 17, 2023Updated 2 years ago
- Serverless Lambda Cron - the fastest and easiest way to schedule lambda functions in the cloud!☆11Jul 7, 2022Updated 3 years ago