This repository contains my implementation of SEED Labs
☆15Jul 17, 2020Updated 5 years ago
Alternatives and similar repositories for SecurityEducation-SEED-_Labs
Users that are interested in SecurityEducation-SEED-_Labs are comparing it to the libraries listed below
Sorting:
- ☆10Feb 26, 2023Updated 3 years ago
- ☆11May 16, 2024Updated last year
- Deliberately insecure Kubernetes test clusters built using kind☆13Aug 16, 2019Updated 6 years ago
- Summarizes Text☆18Apr 20, 2017Updated 8 years ago
- ☆17Jun 26, 2023Updated 2 years ago
- Spring Boot using OAuth2 and Facebook Login example☆16Aug 1, 2024Updated last year
- ☆18Jul 22, 2023Updated 2 years ago
- List of notebooks for ML experiments☆37Aug 21, 2023Updated 2 years ago
- Synaptics Audio Driver LPE☆38Apr 15, 2019Updated 6 years ago
- Gomoku (Five in a Row) game manager with a powerful built-in AI, written in Java with a clean, minimal interface.☆42Dec 19, 2025Updated 3 months ago
- OAuth Security Cheatsheet☆41May 12, 2014Updated 11 years ago
- ☆42May 30, 2019Updated 6 years ago
- From Zero to Hero in Web Security Research - Def Con 29 Workshop☆37Jul 23, 2024Updated last year
- Bare template for a Kernel Mode Driver☆51Mar 10, 2020Updated 6 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Apr 15, 2020Updated 5 years ago
- ☆69Sep 17, 2020Updated 5 years ago
- Multipurpose eCommerce application based on the microservices architecture built with using Spring Boot and ReactJS.☆59Mar 13, 2023Updated 3 years ago
- ☆68May 20, 2022Updated 3 years ago
- ☆90Oct 17, 2020Updated 5 years ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆158Dec 16, 2019Updated 6 years ago
- Code for EI338 Operating System in SJTU. (Programming Projects of Operating System Concepts, 10th Edition)☆97May 3, 2023Updated 2 years ago
- ☆182Jan 18, 2020Updated 6 years ago
- The aim of this Reposiotry is to Provide the Resoursces of Learning at one place For Bug Bounty Hunters.☆142Sep 18, 2023Updated 2 years ago
- ☆140Nov 24, 2025Updated 3 months ago
- Just a part of my private notes☆97Oct 23, 2023Updated 2 years ago
- Preprocessed Python functions and docstrings for automated code documentation (code2doc) and automated code generation (doc2code) tasks.☆211Jul 13, 2020Updated 5 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 8 years ago
- A step by step workshop to exploit various vulnerabilities in Node.js and Java applications☆156Mar 17, 2024Updated 2 years ago
- A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University☆194Oct 5, 2023Updated 2 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆191Aug 9, 2021Updated 4 years ago
- POC for cve-2019-1458☆180Jan 17, 2022Updated 4 years ago
- Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools☆283Sep 18, 2025Updated 6 months ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)☆208Feb 20, 2019Updated 7 years ago
- $MFT directory tree reconstruction & FILE record info☆325Oct 7, 2024Updated last year
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆242Apr 9, 2019Updated 6 years ago
- Leaked Windows processes handles identification tool☆290Mar 14, 2022Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago