An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure software architecture.
☆10Oct 16, 2025Updated 4 months ago
Alternatives and similar repositories for The_Unsecure_PWA
Users that are interested in The_Unsecure_PWA are comparing it to the libraries listed below
Sorting:
- This is a short implementation of N-Tier model software architecture. Use it when you have to reset your main project☆10Nov 10, 2020Updated 5 years ago
- Homework for the Web And Software Architecture course @ Sapienza☆11Jan 24, 2024Updated 2 years ago
- Recovery of Modular Software Architectures with Exact and Heuristic Clustering Methods☆10Jan 29, 2026Updated 3 weeks ago
- This library was created to ensure a consistent and culturally relevant localized end-user experience, by leveraging Unicode locale data …☆11Jun 23, 2025Updated 8 months ago
- pyMBE provides tools to facilitate building up molecules with complex architectures in the Molecular Dynamics software ESPResSo. For an…☆13Nov 10, 2025Updated 3 months ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- It's a project combined with hardware and software, the goal is to make a smart watch based on esp8266 chip. The smart watch has so many …☆10Jul 9, 2019Updated 6 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- Example AIDL service and client☆11Nov 30, 2021Updated 4 years ago
- CNNPRE: A CNN-Based Protocol Reverse Engineering Method☆10Jan 13, 2026Updated last month
- A template for Nuxt Modules with Pnpm and Bun☆16Updated this week
- AMD Generic Encapsulated Software Architecture Platform Security Processor Configuration Block manipulation library☆16Dec 18, 2025Updated 2 months ago
- Habit it is a habit tracker flutter project, built using clean architecture software techniques.☆12Feb 13, 2026Updated 2 weeks ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- JWT key confusion attack, i.e. re-sigining RS256 to HS256☆13May 4, 2022Updated 3 years ago
- Journey to learning frida android.☆11Apr 23, 2019Updated 6 years ago
- Organise and access data collected during internal network pentests☆10Jun 4, 2020Updated 5 years ago
- 区块链融合联邦学习的可信智能车联网系统☆10Oct 6, 2023Updated 2 years ago
- ☆10Mar 27, 2023Updated 2 years ago
- All Cryptography Algorithms are implemented in C.☆13Mar 28, 2021Updated 4 years ago
- An Angular Material app that supports 3 dynamic layouts using Angular content projection and ngTemplate☆10Sep 22, 2021Updated 4 years ago
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- A curated list of cryptography papers, articles, tutorials and howtos.☆10Feb 19, 2024Updated 2 years ago
- Multi-Platform Architecture for Sequence Aligner (MASA) is a flexible software framework that simplifies the creation of DNA sequence ali…☆11Oct 22, 2021Updated 4 years ago
- Software Architecture Design's Diagram & Doc & Man, CMMI, Togaf, GB-T-8567-2006☆12May 11, 2021Updated 4 years ago
- ☆15Apr 7, 2025Updated 10 months ago
- Framework for learning automotive embedded software architecture and cyber security☆14Sep 4, 2018Updated 7 years ago
- A draw.io template for creating software architecture & infrastructure diagrams. Blazing fast & beautiful.☆14Oct 11, 2023Updated 2 years ago
- This repository contains a suite of software and a web application that can be used to manually label unlabeled hyperspectral images and …☆13Jan 16, 2023Updated 3 years ago
- tiktok tools | scrapping | automation☆30Nov 10, 2025Updated 3 months ago
- jackson-databind-exploit☆13Mar 22, 2019Updated 6 years ago
- Notes for the book - Head First Design Patterns☆15Mar 21, 2021Updated 4 years ago
- Notes of Computer Organization and Architecture @ Software Institute, Nanjing University☆10Jan 26, 2021Updated 5 years ago
- ☆13Feb 23, 2025Updated last year
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- An R package for mining software repositories☆31Feb 19, 2026Updated last week
- Spring Boot Web with Hessian☆11Jul 2, 2014Updated 11 years ago