Code samples for the Modern JS workshop
☆25Mar 20, 2019Updated 7 years ago
Alternatives and similar repositories for modernJS
Users that are interested in modernJS are comparing it to the libraries listed below
Sorting:
- Example Ethereum Solidity Contracts☆30Jan 14, 2019Updated 7 years ago
- Training materials for O'Reilly☆24Mar 5, 2019Updated 7 years ago
- ☆13Oct 24, 2017Updated 8 years ago
- Serial Whitelist Application Trainer☆30Jul 7, 2019Updated 6 years ago
- ☆12Mar 31, 2020Updated 5 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- Reverse Shell-able Windows exploits short POCs.☆35Sep 28, 2020Updated 5 years ago
- Fetch Javascript sourcemaps, bounty hunter style☆42May 21, 2023Updated 2 years ago
- ☆11Sep 13, 2017Updated 8 years ago
- CTF Finals☆17Nov 14, 2017Updated 8 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- ☆43Feb 26, 2019Updated 7 years ago
- ☆14Mar 8, 2018Updated 8 years ago
- Privbind is a small tool allowing secure running of unprivileged programs, but allowing them to bind to privileged (<1024) TCP/UDP ports.…☆12Jul 18, 2016Updated 9 years ago
- IDA loader for Apple SecureROM☆13Sep 29, 2019Updated 6 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- ☆12May 9, 2017Updated 8 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 5 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Debug JSSE Provider☆14Dec 4, 2024Updated last year
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago