☆20Aug 14, 2022Updated 3 years ago
Alternatives and similar repositories for aws-encryption-workshop
Users that are interested in aws-encryption-workshop are comparing it to the libraries listed below
Sorting:
- For my live class "Deploying Container-Based Microservices on AWS"☆18Dec 6, 2019Updated 6 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- BERLIN BEARS Kitas☆11Nov 1, 2021Updated 4 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Code examples for the book Mockito Made Clear, from Pragmatic Programmers☆39Feb 16, 2026Updated 2 weeks ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- Session Manager and Middleware for Go net/http☆11Feb 11, 2025Updated last year
- App to quickly add Physical Machines into VMware Horizon Manual Pool☆11Mar 23, 2020Updated 5 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- O'Reilly Course, In-Memory Computing Essentials☆10Oct 16, 2020Updated 5 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- O'Reilly Architecture Kata☆10Nov 19, 2021Updated 4 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- ☆14Mar 8, 2018Updated 7 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- O'Reilly Architectural Katas 2021 fall☆12Nov 30, 2021Updated 4 years ago
- A node.js client library for using the Alexa Skill Management API.☆13Jul 9, 2019Updated 6 years ago
- Full featured restful authentication starter app from http://railsforum.com/viewtopic.php?id=14216 combining role requirement, open id au…☆157Mar 22, 2009Updated 16 years ago
- A distributed lock algorithm for redis, see http://redis.io/topics/distlock☆12Jul 20, 2015Updated 10 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Website for jbang.dev☆13Feb 18, 2026Updated 2 weeks ago
- ☆12May 9, 2017Updated 8 years ago
- A vim docker setup that is a portable IDE☆14Nov 20, 2022Updated 3 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- ☆16Feb 17, 2023Updated 3 years ago
- Debug JSSE Provider☆14Dec 4, 2024Updated last year
- A map of who's doing what about Blockchain in Thailand☆13Oct 2, 2018Updated 7 years ago
- Repository for Privacy Research☆11Feb 2, 2021Updated 5 years ago
- ☆15May 23, 2019Updated 6 years ago