collection of ppt/pdf from security conferences
☆19Feb 25, 2026Updated last week
Alternatives and similar repositories for security-conference
Users that are interested in security-conference are comparing it to the libraries listed below
Sorting:
- security advisories☆12Feb 22, 2021Updated 5 years ago
- Firefox extension which parses the headers of all the requests which are being flowing through your firefox browser to detect for vulnera…☆60Oct 28, 2018Updated 7 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- A CLI Passthrough in Python with all the bells and whistles.☆23Jan 17, 2023Updated 3 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- OSINT Intelligence for different areas ( useful for different type of investigations and learning etc)☆37May 20, 2020Updated 5 years ago
- ☆29Feb 20, 2026Updated 2 weeks ago
- ☆10Feb 18, 2023Updated 3 years ago
- 之前的个人wiki。现在用 Blog 的形式来写了。这个wiki就放在这里吧。希望里面的内容能帮助到别人。☆10Apr 2, 2020Updated 5 years ago
- spring mvc cve-2014-3625☆32Mar 11, 2016Updated 9 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- GitHub action to generate a CycloneDX SBOM for .NET☆12Jul 15, 2025Updated 7 months ago
- MCP Registry Demo - A reference implementation on Azure API Center☆12May 17, 2025Updated 9 months ago
- Full archive of IndieWeb chat log data files☆16Updated this week
- MultiStep MCP That Returns CVE Information With EPSS Score☆13May 22, 2025Updated 9 months ago
- A rewrite of the popular altDNS subdomain tool by @infosec-au☆12Feb 28, 2019Updated 7 years ago
- Website sources for the Apache Directory website☆10Nov 20, 2025Updated 3 months ago
- Just for me, not for you.☆11Jul 3, 2021Updated 4 years ago
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- ☆11Mar 30, 2019Updated 6 years ago
- Solidity CTF challenge from BSides TLV 2022☆14Jul 8, 2022Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- ☆14Jan 18, 2020Updated 6 years ago
- ☆11May 14, 2021Updated 4 years ago
- ☆11Mar 19, 2022Updated 3 years ago
- AI Resilience Maturity Model☆25Aug 4, 2024Updated last year
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- 做过的实验,踩过的坑☆40Jun 7, 2018Updated 7 years ago
- Web&Browser Security☆43Sep 27, 2022Updated 3 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- ☆12May 27, 2021Updated 4 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- CDS Threat Modeling Tool MVP☆14Updated this week
- A site to easily decode the content of Rails sessions stored in cookies.☆16Jan 26, 2014Updated 12 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago