Resources for learning about application security
☆55Jan 27, 2017Updated 9 years ago
Alternatives and similar repositories for Application-Security
Users that are interested in Application-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- List of web application security☆163Jan 27, 2017Updated 9 years ago
- Collection of Android security related resources☆105Jan 4, 2024Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- JavaScript (Node) Call Flooder☆13Mar 11, 2021Updated 5 years ago
- List of Golang books☆40Dec 2, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆17Sep 2, 2021Updated 4 years ago
- Resources for learning about Exploit Development☆431Oct 1, 2020Updated 5 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- Want to become an Application Security Engineer? Here's a roadmap to help you get there.☆35Sep 3, 2022Updated 3 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆96Jan 2, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Various exploits☆10Apr 27, 2017Updated 9 years ago
- Offensive Security OSWE Prep 2022☆79Sep 10, 2022Updated 3 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- Resources for Mobile Application Testing 📓☆78Mar 30, 2024Updated 2 years ago
- Penetration testing course by Z0F.☆53Oct 6, 2021Updated 4 years ago
- List of awesome penetration testing resources, tools and other shiny things☆2,747Oct 18, 2023Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated 2 years ago
- Presentaciones de congresos☆54Jun 21, 2024Updated last year
- ☆35Nov 14, 2024Updated last year
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Apr 16, 2026Updated last month
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Mar 9, 2020Updated 6 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆58Mar 28, 2026Updated last month
- Scans an internal network using massscan and nmap☆19Nov 21, 2025Updated 6 months ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Nov 16, 2023Updated 2 years ago
- ☆28Aug 12, 2021Updated 4 years ago
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago