alulsh / intro-to-security-for-developersView external linksLinks
An introduction to security for developers.
☆29Feb 14, 2021Updated 4 years ago
Alternatives and similar repositories for intro-to-security-for-developers
Users that are interested in intro-to-security-for-developers are comparing it to the libraries listed below
Sorting:
- Post-CTF writeups☆12Oct 28, 2016Updated 9 years ago
- Multiple XSS Pocs (some server via gh-pages)☆16Feb 17, 2017Updated 8 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- source code and binaries related to my trainings☆20Oct 18, 2016Updated 9 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Nov 13, 2016Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- ☆11Feb 21, 2016Updated 9 years ago
- Topology library for Coq☆12Dec 24, 2015Updated 10 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 8 years ago
- Basic integration between GraphQL-RxJs & GraphQL-Transport-WS☆12Nov 3, 2017Updated 8 years ago
- Themis MapReduce and TritonSort☆11Nov 2, 2017Updated 8 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- This is a collection of Jupyter Notebooks for teaching and outreach purposes☆10Oct 3, 2023Updated 2 years ago
- An open hardware reference design based on Mitochondrik-LV.☆13Aug 21, 2024Updated last year
- OpenTitan: Open source silicon root of trust☆10Feb 5, 2020Updated 6 years ago
- The NowSecure Mobile Security Report☆11Nov 16, 2016Updated 9 years ago
- Some notes on the relationship between the Legendre and Fourier transforms☆11Dec 18, 2025Updated last month
- Experiments with syntax and symbols☆15Mar 5, 2019Updated 6 years ago
- PoWx mission: Aiming at smaller energy per hash hardware.☆11Dec 18, 2021Updated 4 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Core software stack used by the MIT Hyperloop Team during the SpaceX Hyperloop Pod Competition in January 2017.☆10Jan 30, 2026Updated 2 weeks ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- Stan Jupyter Magic☆11Oct 6, 2018Updated 7 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- ☆12Aug 12, 2025Updated 6 months ago
- Tor relay nearest neighbour ranking☆10Oct 18, 2021Updated 4 years ago
- Demonstrating a practical attack on the Diffie Hellman Key Exchange protocol, through breaking a secure chat system☆14Oct 23, 2015Updated 10 years ago
- a better spawn☆12Aug 12, 2018Updated 7 years ago
- Nonlinear trajectory generation library☆10Aug 22, 2022Updated 3 years ago
- svn cloner is a kit for downloading source code through .svn info.☆16Sep 12, 2012Updated 13 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- A collection of thermohydraulic correlations for thermal systems and heat exchangers☆12Dec 27, 2014Updated 11 years ago
- Example Scala/SBT event consumer for Amazon Kinesis☆22May 20, 2015Updated 10 years ago
- ☆10May 17, 2021Updated 4 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- UVNet data acquisition (DAQ). For doing process control or other monitoring.☆18Dec 30, 2020Updated 5 years ago
- ATtiny-based Jar of Fireflies soldering project☆11Jul 10, 2016Updated 9 years ago