☆23Mar 18, 2022Updated 3 years ago
Alternatives and similar repositories for security-guide-for-developers
Users that are interested in security-guide-for-developers are comparing it to the libraries listed below
Sorting:
- ☆22Jul 28, 2019Updated 6 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- INACTIVE - http://mzl.la/ghe-archive - Unit Tests for your Network -☆44Mar 29, 2019Updated 6 years ago
- Fork of setblocksize☆10Jan 17, 2019Updated 7 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- Small program to generate a Graphviz dot file to visualize a SQLite schema and foreign keys structure☆13Mar 6, 2017Updated 8 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- LILLY - Latex Framework☆12Jul 29, 2021Updated 4 years ago
- contains C programs that tests the effectiveness of SAST.☆12Jan 9, 2024Updated 2 years ago
- A Java implementation of in-toto runlib☆11Jul 23, 2024Updated last year
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- ☆12May 2, 2023Updated 2 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 9 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Library to manipulate CSP reports and policies☆15Apr 18, 2014Updated 11 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- ☆11Oct 16, 2022Updated 3 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Small bash function library to turn on bash options that enhance robustness of scripts.☆17Apr 17, 2025Updated 10 months ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- My emacs configuration.☆10Feb 15, 2026Updated 2 weeks ago
- ☆12Jun 13, 2016Updated 9 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Mattermost builder☆11Jan 1, 2022Updated 4 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- A TGIK (by Heptio) playlist in text form with reference to the individual show notes.☆15May 18, 2018Updated 7 years ago
- Nilcons Slides - quality presentations from code☆10Jul 29, 2021Updated 4 years ago
- Demonstrate the use of Ansible best practices in a workshop☆10Jul 7, 2019Updated 6 years ago