Code examples for the talk Secure Coding Practices in C++
☆52Oct 25, 2023Updated 2 years ago
Alternatives and similar repositories for insecure-coding-examples
Users that are interested in insecure-coding-examples are comparing it to the libraries listed below
Sorting:
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- A code-searching/completion tool, for IDA APIs☆83Jan 22, 2025Updated last year
- homebridge smartthings plugin☆21Feb 25, 2026Updated last week
- Prototype road engine from 1993. Finally morphed into Road Rash after getting the contract from Ocean via Gary Bracey☆16Sep 23, 2025Updated 5 months ago
- ☆13Feb 20, 2026Updated 2 weeks ago
- PassDock public issue tracker.☆23Nov 11, 2014Updated 11 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- contains C programs that tests the effectiveness of SAST.☆12Jan 9, 2024Updated 2 years ago
- DEPRECATED: Element Hiding Helper extension for Adblock Plus☆11Dec 1, 2017Updated 8 years ago
- A dummy TCP client and server application.☆11Nov 16, 2021Updated 4 years ago
- Frida scripts☆12Jun 5, 2021Updated 4 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- Testing android heap size allocation☆11Sep 4, 2016Updated 9 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Jan 4, 2016Updated 10 years ago
- Some of my crypto challenges☆11Jun 21, 2020Updated 5 years ago
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated 2 months ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- Use your SmartThings Hub to sync your color changing lights with natural daylight hues☆33Mar 28, 2016Updated 9 years ago
- A program that automatically generates AFL-enabled builds of Debian packages.☆94Feb 17, 2020Updated 6 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- The ADC Theatre's room booking system☆12Oct 16, 2023Updated 2 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- ☆12Jun 3, 2022Updated 3 years ago
- This library allows you to track the commits from the facepunch site.☆10Mar 30, 2023Updated 2 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- ☆11Aug 27, 2022Updated 3 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- 🖥🚀 Web development explained for normal people!☆10Apr 22, 2024Updated last year
- ☆11Apr 10, 2018Updated 7 years ago
- Generates your Github projects in HTML for your (static) website to use from a predefined template.☆12Jan 29, 2021Updated 5 years ago
- Simple authentication toolkit for works with Yubikey☆13Updated this week
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Resources for Cyber Security☆11Oct 30, 2018Updated 7 years ago
- This repository contains my work done on the virtual internship provided by Australia's NSW Government on part-time job analysis of the w…☆10Jul 3, 2020Updated 5 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- ☆15Jul 3, 2025Updated 8 months ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago