alulsh / intro-to-security-for-developers
An introduction to security for developers.
☆28Updated 4 years ago
Alternatives and similar repositories for intro-to-security-for-developers:
Users that are interested in intro-to-security-for-developers are comparing it to the libraries listed below
- Multiple XSS Pocs (some server via gh-pages)☆16Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Hijack clicks on and within links, probably for client-side routing☆42Updated 4 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Updated 10 years ago
- Tutorial for Node.js security☆21Updated 4 years ago
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017☆13Updated 8 years ago
- Test Suite and exemplary extensions of the "Attacking Browser Extensions" master's thesis☆28Updated 8 years ago
- Personal security checklist for securing your devices and accounts.☆274Updated 5 years ago
- Simple, hand-picked list of fuzz strings☆32Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- Damn Vulnerable Node Application☆19Updated 9 years ago
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆20Updated 7 years ago
- Xss Vulnerability Demonstration framework.☆12Updated 11 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Updated 9 years ago
- A backdoor embedded with Twitter Player Card☆12Updated 7 years ago
- A tool to triage screenshots☆19Updated 7 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Updated 9 years ago
- An ultra-compact intro (or refresher) to Web Application Security.☆31Updated 7 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- Hackerone disclosed report URL Aggregator☆29Updated 6 years ago
- ☆19Updated 3 years ago
- ☆20Updated 8 years ago
- ☆27Updated 7 years ago
- ☆26Updated 8 years ago
- Solicitation and acquisition documents created for the TTS Bug Bounty program that can be reused by other government agencies and organiz…☆19Updated 6 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- A python script for obfuscating wireless networks☆77Updated 8 years ago