njgibbon / nicks-cors-testView external linksLinks
Simple HTML & JS Tool to quickly test CORS locally.
☆125Oct 28, 2021Updated 4 years ago
Alternatives and similar repositories for nicks-cors-test
Users that are interested in nicks-cors-test are comparing it to the libraries listed below
Sorting:
- Differential Privacy implementation for IUDX☆13Jan 5, 2026Updated last month
- Penetration testing course by Z0F.☆52Oct 6, 2021Updated 4 years ago
- ☆15Feb 15, 2022Updated 4 years ago
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated 3 weeks ago
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated last month
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- A maid cafe's maid AI assistant with Microsoft Semantic Kernel☆10May 11, 2024Updated last year
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 5 years ago
- The backbone for message-driven applications.☆12Sep 11, 2021Updated 4 years ago
- A Custom Transport strategy of the NestJS microservices pattern for Cloud Pub/Sub☆11Mar 17, 2025Updated 10 months ago
- ☆10Apr 8, 2018Updated 7 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆15Jul 3, 2025Updated 7 months ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- For the benefit of programmers.☆10Oct 28, 2021Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Find and Use Cheats via the PythonGDB API☆11Aug 1, 2016Updated 9 years ago
- Collection of resources for responding to the Log4j set of vulnerabilities.☆11Feb 22, 2022Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- ☆10Sep 12, 2019Updated 6 years ago
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- General purpose Discord Bot with the hacker in mind☆13Nov 6, 2025Updated 3 months ago
- Source code related of the articles posted in medium.com☆12Nov 2, 2020Updated 5 years ago
- RTL-SDR 433MHz signal recovery with MATLAB☆12Feb 13, 2015Updated 11 years ago
- ☆15Mar 28, 2015Updated 10 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- SvelteKit user template authentication, authorization model for sveltekit, cookies, token auth sveltekit, template user token sveltekit☆11Sep 16, 2022Updated 3 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- ☆10Aug 28, 2020Updated 5 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago