An introduction to security for developers.
☆28Feb 14, 2021Updated 5 years ago
Alternatives and similar repositories for intro-to-security-for-developers
Users that are interested in intro-to-security-for-developers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ATtiny-based Jar of Fireflies soldering project☆11Jul 10, 2016Updated 9 years ago
- Post-CTF writeups☆12Oct 28, 2016Updated 9 years ago
- Multiple XSS Pocs (some server via gh-pages)☆16Feb 17, 2017Updated 9 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- source code and binaries related to my trainings☆20Oct 18, 2016Updated 9 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Examples for ngconf 2016 talk on Testing, Tasks, and Zones☆29May 6, 2016Updated 9 years ago
- svn cloner is a kit for downloading source code through .svn info.☆16Sep 12, 2012Updated 13 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- A list of resources about DevOps from the #cloud_devops channel on WGXCDC slack☆33Aug 2, 2025Updated 7 months ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 5 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/checkout4mac☆13Oct 24, 2016Updated 9 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Linux Kernel Module Debugger☆15Sep 27, 2016Updated 9 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Nov 13, 2016Updated 9 years ago
- Very simple example of how to detect if the device is jailbroken. This is not the most efficient way but it will work in most cases.☆18Mar 12, 2016Updated 10 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Using Baidu to determine your network condition without really open it.☆16May 16, 2016Updated 9 years ago
- Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.☆18Jan 3, 2017Updated 9 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 8 years ago
- ☆11Feb 21, 2016Updated 10 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Collaborative Knowledgebase base where people can contribute to Android Tamer☆19Jul 27, 2022Updated 3 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Jan 15, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- In memory fuzzing for embedded devices☆19Jun 20, 2012Updated 13 years ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Apr 30, 2013Updated 12 years ago
- Sample Scripts for JEB(Android Interactive Decompiler)☆24Jan 9, 2014Updated 12 years ago
- Reconnaissance test in Kubernetes clusters☆21Oct 19, 2018Updated 7 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆16May 2, 2024Updated last year