The App Defense Alliance (ADA) protects users of mobile and web applications, through industry recognized security standards, validation guidance and a certification scheme.
☆87Apr 29, 2026Updated last week
Alternatives and similar repositories for ASA-WG
Users that are interested in ASA-WG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This script is to build Wazuh 4.3 environment☆12May 30, 2022Updated 3 years ago
- Automatically disable WooCommerce's checkout process after reaching a maximum number of orders.☆17Jan 27, 2026Updated 3 months ago
- This repository is obsolete. Use kinogmt/centos-ssh.git or kingomt/kerlotp.git instead.☆12Aug 4, 2017Updated 8 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- A National Vulnerability Database (NVD) API query tool☆17Jun 27, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Native Rust bindings for @horsicq's Detect-It-Easy☆20Nov 11, 2025Updated 5 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 4 years ago
- ☆18Sep 29, 2023Updated 2 years ago
- ☆15Jul 13, 2023Updated 2 years ago
- Simple C program to quickly deobfuscate windows executables protected with Arxan.☆14Dec 18, 2022Updated 3 years ago
- Some crackme i built for Android☆12Apr 15, 2020Updated 6 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Oct 6, 2022Updated 3 years ago
- Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities datab…☆18May 18, 2022Updated 3 years ago
- Obfuscator LLVM Binaries☆13Feb 10, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This demo project is the code a tutorial on how to hacking an Android games using Frida☆19Jun 29, 2022Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Mar 20, 2024Updated 2 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- Downloads, configures, compiles and installs the latest stable kernel from kernel.org☆43Dec 1, 2025Updated 5 months ago
- ☆11Oct 17, 2024Updated last year
- A penetration testing tool to help in Infrastructure pentesting process.☆12Sep 19, 2023Updated 2 years ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆43Jan 31, 2026Updated 3 months ago
- ☆42Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆18Aug 6, 2024Updated last year
- This repository will contain all the scripts and techniques we have used to bypass MSTG crackme challenges.☆19Feb 26, 2023Updated 3 years ago
- ☆10Feb 8, 2021Updated 5 years ago
- ☆18Jul 15, 2020Updated 5 years ago
- Detecting repackaged magisk in less than a second☆21Jul 8, 2019Updated 6 years ago
- OWASP Foundation Web Respository☆28Apr 8, 2026Updated last month
- ☆19Jan 7, 2025Updated last year
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆227Sep 4, 2024Updated last year
- Let Your Ai Do It☆28Apr 16, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PoC showing a method to hide syscalls on XNU (arm64 macOS and iOS) from static analysis☆34Oct 3, 2022Updated 3 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆14May 15, 2024Updated last year
- 阿里2015第二届安全挑战赛第三题题解☆24Jun 14, 2021Updated 4 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- Hash Checker Bypass and Process Hacker☆19Nov 14, 2021Updated 4 years ago
- Example of a vulnerable NodeJS+Express+MySQL service☆20Jan 17, 2023Updated 3 years ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆28Nov 30, 2025Updated 5 months ago