gdscewha-3rd / DevFest-2021-Secure-Coding-GuidelineView external linksLinks
π² κ°λ° 보μ μνμ΄ μ½λ© κ°μ΄λλΌμΈ π² DevFest 2021 Ewha Womans University : Secure Coding Guideline
β62Jan 21, 2022Updated 4 years ago
Alternatives and similar repositories for DevFest-2021-Secure-Coding-Guideline
Users that are interested in DevFest-2021-Secure-Coding-Guideline are comparing it to the libraries listed below
Sorting:
- A Docker - composer example that provides flask, java, mysql and mongo containerβ16Dec 31, 2020Updated 5 years ago
- νΈλ¬λΈ μν λ° νμ λͺ¨μλλ λ ν¬ (Today I Learned)β31Aug 2, 2023Updated 2 years ago
- Starter Projects for the Docker Courseβ11Dec 25, 2025Updated last month
- OWASP Coimbatore's Web & Project Repositoryβ13Jan 23, 2026Updated 3 weeks ago
- Some notes written during my OSCP Journey (KeepNote project)β10Mar 2, 2020Updated 5 years ago
- Collection of resources for responding to the Log4j set of vulnerabilities.β11Feb 22, 2022Updated 3 years ago
- Simple script for testing CVE-2016-2402 and similar flawsβ13Mar 30, 2016Updated 9 years ago
- β12Mar 31, 2021Updated 4 years ago
- It contain google dork to find the wsdl file.β13May 27, 2020Updated 5 years ago
- O24Sec (Object-Oriented Clustering for Security Monitoring)β10May 17, 2022Updated 3 years ago
- AWS container security survey 2020β11Dec 2, 2020Updated 5 years ago
- coupang open apiβ12Nov 16, 2021Updated 4 years ago
- μΏ ν‘μ΄μΈ μ¬μ‘°! μΏ ν‘ μ£Όμ μ¬μ‘°!β10Dec 4, 2021Updated 4 years ago
- β10May 6, 2017Updated 8 years ago
- β10Aug 28, 2020Updated 5 years ago
- Source code related of the articles posted in medium.comβ12Nov 2, 2020Updated 5 years ago
- My blogβ10Oct 6, 2025Updated 4 months ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rceβ10Dec 16, 2021Updated 4 years ago
- Exposes Redis stream through the command lineβ12Jun 28, 2022Updated 3 years ago
- β15Jul 3, 2025Updated 7 months ago
- Chef library cookbook for managing AWS Security Groupsβ11Sep 7, 2016Updated 9 years ago
- Tools and Scripts used in CRTPβ12Apr 27, 2020Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforceβ13Jan 7, 2025Updated last year
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.β10Oct 31, 2023Updated 2 years ago
- β20Jan 12, 2022Updated 4 years ago
- νμ μ΄λ μμ±/μλ½ κ°λ¨ μμ | java springbootβ94Dec 1, 2022Updated 3 years ago
- security related events, tools, tutorials, cheatsheets, and more.β11Oct 20, 2015Updated 10 years ago
- Curated list of useful resources for this quarantine daysβ13Mar 17, 2023Updated 2 years ago
- β’ Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.β12Jan 1, 2015Updated 11 years ago
- Serverless Lambda Cron - the fastest and easiest way to schedule lambda functions in the cloud!β11Jul 7, 2022Updated 3 years ago
- Everything about Microsoft Cloud (Azure, M365, etc.) and a hybrid infrastructure!β15Mar 9, 2022Updated 3 years ago
- This repo has all the code samples/configs used on my channel https://www.youtube.com/c/bitspleaseβ15Dec 26, 2025Updated last month
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentialsβ10Jun 30, 2021Updated 4 years ago
- β10May 14, 2021Updated 4 years ago
- Here you will find information and examples about the most known vulnerabilities in the Bug Bounty world! [ EN ESPAΓOL ]β14Oct 23, 2021Updated 4 years ago
- Automated provisioning of Santoku Linux (configuration of an Ubuntu VM containing the Android development environment, including Android β¦β11Mar 4, 2014Updated 11 years ago
- Load your data into burpβ11Apr 26, 2023Updated 2 years ago
- Bootstrapping setup for participantsβ10Dec 29, 2021Updated 4 years ago
- Admin forβ16Jun 3, 2018Updated 7 years ago