ikoz / cert-pinning-flaw-pocView external linksLinks
Simple script for testing CVE-2016-2402 and similar flaws
☆13Mar 30, 2016Updated 9 years ago
Alternatives and similar repositories for cert-pinning-flaw-poc
Users that are interested in cert-pinning-flaw-poc are comparing it to the libraries listed below
Sorting:
- This project demonstrates the concept of a quantum database using Cirq. The quantum database stores binary data in quantum qubits, and op…☆16Apr 3, 2025Updated 10 months ago
- Intro to Quantum Computing - quantum optics to algorithms with interactive labs☆24May 22, 2025Updated 8 months ago
- ☆39Mar 9, 2023Updated 2 years ago
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated 3 weeks ago
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated last month
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 5 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Apr 8, 2020Updated 5 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 4 months ago
- A Gradle plugin for checking whether an .apk or an .aar contains OpenSSL versions with known vulnerabilities☆12Nov 28, 2016Updated 9 years ago
- ECMAScript source modification tool☆62Feb 6, 2016Updated 10 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- buddycloud static site generation and gh_pages☆18Sep 8, 2016Updated 9 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- ☆15Jul 3, 2025Updated 7 months ago
- Collection of resources for responding to the Log4j set of vulnerabilities.☆11Feb 22, 2022Updated 3 years ago
- Example repository for D and Codecov☆10Jan 22, 2024Updated 2 years ago
- Integrate the Helpscout Beacon in to you React Native app☆11Nov 11, 2025Updated 3 months ago
- My blog☆10Oct 6, 2025Updated 4 months ago
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 6 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated last week
- ☆10May 6, 2017Updated 8 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- TessTwo (Tesseract) Android module for Appcelerator's Titanium☆22Sep 26, 2012Updated 13 years ago
- Pentest TeamCity using Metasploit☆45Feb 8, 2021Updated 5 years ago
- Source code related of the articles posted in medium.com☆12Nov 2, 2020Updated 5 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆11Dec 19, 2024Updated last year
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Inspect and manipulate UIWebView-hosted GUIs through Frida.☆51Jun 16, 2025Updated 8 months ago