网安类绝版图书
☆58Jan 7, 2023Updated 3 years ago
Alternatives and similar repositories for sec-books
Users that are interested in sec-books are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆40Aug 12, 2025Updated 8 months ago
- 通达OA OfficeTask udp 2397 端口远程代码执行RCE检测工具☆22Jun 13, 2025Updated 10 months ago
- 本项目是一个以“实战为导向”的 XSS 漏洞练习靶场,覆盖反射型、存储型、DOM 型、SVG、CSP、框架注入、协议绕过等多种场景。页面样式统一,逻辑清晰,适合系统化学习与教学演示☆31Mar 6, 2026Updated last month
- [ICSE2020] UAFL DataSet☆12Dec 10, 2022Updated 3 years ago
- 一些渗透测试学习笔记☆13Jul 22, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 一个红队知识仓库☆11Aug 1, 2023Updated 2 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- 大华智慧园区系统sso_initsession文件上传批量脚本☆22Sep 4, 2023Updated 2 years ago
- WooYun Drops Markdown☆14Jun 28, 2020Updated 5 years ago
- ☆19Aug 25, 2022Updated 3 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- ☆16May 17, 2024Updated last year
- 过往收集和学习的 pdf 电子书包含有:web 安全、渗透测试、红蓝对抗、应急响应等等技术集☆12Mar 28, 2025Updated last year
- 動態切換Line Bot Rich Menu的範例☆10Jun 22, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 一个高速的隐蔽隧道,伪装TCP流量为SMTP电子邮件通信以绕过深度包检测(DPI)防火墙。☆48Feb 23, 2026Updated 2 months ago
- 📖 Webduino example collections☆10Sep 17, 2021Updated 4 years ago
- 渗透测试学习笔记☆14Jul 9, 2022Updated 3 years ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- 防疫時尚,救國也要有型!自製 Micro:bit 額溫槍工作坊☆10May 15, 2021Updated 4 years ago
- 基于alpine+php7.3的一个RCE命令执行靶场,包含基础命令、shell 特性、常见姿势、常见waf绕过☆58Nov 18, 2025Updated 5 months ago
- 群众自发☆11Jun 18, 2025Updated 10 months ago
- Start4burp is a burpsuit plugin☆20Sep 18, 2024Updated last year
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 基于 Facebook 开源的 Docusarus 博客框架,可快速搭建个人博客网站☆21Updated this week
- A Android program help you learn English.☆14Mar 18, 2024Updated 2 years ago
- DBGBench Website:☆19Feb 24, 2021Updated 5 years ago
- SecNotes: 记录安全学习之路。包含红蓝攻防,安全运营,甲方安全建设,威胁情报,安全事件响应,蜜罐,安全证书考试等。☆57Feb 19, 2025Updated last year
- SmartArduino is specializing in the open source hardware, like Arduino compatible boards, Raspberry pi, Beaglebone, Robotics, and Aircraf…☆15Sep 19, 2014Updated 11 years ago
- SVG versions of the App Inventorblocks to be used in tutorials or in the classroom.☆15Mar 23, 2019Updated 7 years ago
- CVE-2025-54424:1Panel 客户端证书绕过RCE漏洞 一体化工具 (扫描+利用)☆59Aug 5, 2025Updated 8 months ago
- General tips and advice for becoming interested in research, finding a suitable topic, and setting goals.☆28Mar 17, 2021Updated 5 years ago
- An artificially intelligent agent inspired by The Machine and Samaritan From Person of Interest.☆12Aug 25, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 海康威视iSecure后渗透☆30Aug 13, 2024Updated last year
- This project introduces sample programs of the URG library. Applications using URG and URG library are also introduced here. URG is Scann…☆12Oct 4, 2020Updated 5 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- This repo is a repo for the Hacking Smart Toys Graduate Class☆19May 9, 2019Updated 6 years ago
- VulnWatchdog 是一个自动化的漏洞监控和分析工具。它可以监控 GitHub 上的 CVE 相关仓库,获取漏洞信息和 POC 代码,并使用 GPT 进行智能分析,生成详细的分析报告。☆95Updated this week
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- ☆14Jun 1, 2018Updated 7 years ago