alulsh / intro-to-security-for-developers
An introduction to security for developers.
☆28Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for intro-to-security-for-developers
- Damn Vulnerable Node Application☆20Updated 8 years ago
- Multiple XSS Pocs (some server via gh-pages)☆15Updated 7 years ago
- Secure approach to secure file storage in untrusted environments.☆36Updated 5 years ago
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017☆13Updated 7 years ago
- Extract metadata (EXIF) from uploaded files on Slack☆15Updated 7 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 5 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 7 years ago
- A JavaScript clickjacking PoC generator☆22Updated 5 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Updated 9 years ago
- ARPER is an arp cache poisoning tool, it sends spoofed address resolution protocol messages onto a local area network. It has the abilit…☆8Updated 10 years ago
- ☆13Updated 2 years ago
- Hijack clicks on and within links, probably for client-side routing☆42Updated 4 years ago
- ☆11Updated 7 years ago
- Simple, hand-picked list of fuzz strings☆32Updated 8 years ago
- ☆7Updated 3 years ago
- A tool to triage screenshots☆19Updated 7 years ago
- Solicitation and acquisition documents created for the TTS Bug Bounty program that can be reused by other government agencies and organiz…☆19Updated 6 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Updated 6 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- ☆19Updated 3 years ago
- Deliberately vulnerable web application☆22Updated 7 years ago
- PHP Demo for xss using Exif metadeta.☆9Updated 9 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- An ultra-compact intro (or refresher) to Web Application Security.☆31Updated 6 years ago
- Get detailed information about a Twitter user activity☆17Updated 6 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago