All Security Engineering Resources
☆15Feb 2, 2018Updated 8 years ago
Alternatives and similar repositories for Sec-Dump
Users that are interested in Sec-Dump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Write-ups for various CTF challenges solved by the team☆16Oct 6, 2017Updated 8 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆11Jan 27, 2017Updated 9 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- UNSW - Data Structures and Algorithms (Computing 2)☆14Sep 27, 2017Updated 8 years ago
- Study CTF, study security☆88Jul 16, 2019Updated 6 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- Cheatsheets on security vulnerabilities and exploits.☆35Jan 20, 2020Updated 6 years ago
- Lazily wraps various Linux system auditing tools☆20Updated this week
- A collection of Nagios plugins that we package.☆41Mar 22, 2016Updated 10 years ago
- 多线程网站目录穷举扫描修改版☆26Jun 17, 2016Updated 9 years ago
- 模拟请求工信部查询备案信息☆12Aug 29, 2018Updated 7 years ago
- A simple MediaWiki extension to give you control over the html title and meta tags via a tag or parser function.☆17Jul 13, 2019Updated 6 years ago
- ☆17Apr 21, 2017Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Distinguish the site is used CDN☆18Nov 8, 2018Updated 7 years ago
- a gui for TRID ( http://mark0.net/soft-trid-e.html )☆22May 30, 2016Updated 9 years ago
- 极验验证码☆11Sep 20, 2018Updated 7 years ago
- ☆44Feb 25, 2026Updated 3 weeks ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆11Dec 20, 2015Updated 10 years ago
- Some useful tools and scripts☆47Feb 11, 2023Updated 3 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- SALSA 💃⚡ - SALesforce Scanner for Aura (and beyond). Enumeration of vulnerabilities and misconfigurations against Salesforce endpoint.☆29Jan 26, 2025Updated last year
- WireShark URI Decode LUA Plugin☆20Nov 7, 2018Updated 7 years ago
- 漏洞测试环境 - 方便写扫描器利用复现☆27Aug 12, 2019Updated 6 years ago
- Describes the very basics of sql-injection☆12Apr 23, 2021Updated 4 years ago
- Powershell & Python XOR 2 Files☆15Nov 22, 2018Updated 7 years ago
- Simple ciphers implementation in Python. AtBash, Bacon, Bifid, Caesar, Polybius.☆20Nov 30, 2014Updated 11 years ago
- ☆22Apr 17, 2017Updated 8 years ago
- ☆21Sep 5, 2018Updated 7 years ago
- A function for decoding percent-encoded URLs☆21May 28, 2016Updated 9 years ago
- Syclover PPT☆30May 22, 2017Updated 8 years ago
- Design Software Architecture Research☆13May 27, 2018Updated 7 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- Boot-to-Breach red team lab on AWS. Mythic, Sliver, and Havoc C2 behind a production-style Apache redirector. Deployed via Terraform, to …☆168Updated this week
- Node.js and MySQL app☆17Apr 9, 2016Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- A curated list of Hardware Hacking resources☆12Apr 14, 2020Updated 5 years ago
- some pentest scripts & tools by yaseng@uauc.net☆150Feb 26, 2020Updated 6 years ago