Lab Material for Android Attack & Defense Course
☆15Oct 16, 2019Updated 6 years ago
Alternatives and similar repositories for Android-Attack-Defense
Users that are interested in Android-Attack-Defense are comparing it to the libraries listed below
Sorting:
- Lab Material for iOS Attack & Defense Course☆22Oct 15, 2019Updated 6 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆10Jun 22, 2021Updated 4 years ago
- Lab Material for the Two-Day Defending Modern DevOps Environments Course☆126Dec 4, 2019Updated 6 years ago
- A collection of libraries and utilities to simplify the process of building web service applications.☆34Jul 19, 2024Updated last year
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated last month
- ☆10Aug 3, 2020Updated 5 years ago
- Mob Battle mod for minecraft☆14Nov 27, 2025Updated 3 months ago
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated 2 months ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- A suite of cybersecurity applications used in Brazilian Army Cyber Security course to accelerate and automate processes. Some tools have …☆21Feb 23, 2025Updated last year
- YUI3 Gallery Modules☆29May 11, 2012Updated 13 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- AWS Lambda powered drop-in replacement for ImageMagick convert command line tool☆11Oct 25, 2025Updated 4 months ago
- The projects and the materials that accompany the Android Background Processing video course☆11Dec 9, 2022Updated 3 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- My blog☆10Oct 6, 2025Updated 4 months ago
- ☆10Aug 28, 2020Updated 5 years ago
- My learning on "google-interview-university"☆10Jul 19, 2017Updated 8 years ago
- ☆13Sep 1, 2017Updated 8 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Official OWASP Top 10 Document Repository☆10Jan 9, 2018Updated 8 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Secure Cloud Object REsource: file transfer microservice☆18Jan 26, 2026Updated last month
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Source code related of the articles posted in medium.com☆12Nov 2, 2020Updated 5 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 3 weeks ago
- Collection of resources for responding to the Log4j set of vulnerabilities.☆11Feb 22, 2022Updated 4 years ago
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆15Jul 3, 2025Updated 8 months ago
- ☆10Nov 20, 2021Updated 4 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- ☆10May 6, 2017Updated 8 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago