Stars
A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
federicodotta / ysoserial
Forked from frohoff/ysoserialA proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
The Good Parts of Application Security: learn how to build and test secure webapps
Transforms docker-compose, ECS, and Marathon configurations
An EC2 Container Service Reference Architecture for providing Service Discovery to containers using CloudWatch Events, Lambda and Route 53 private hosted zones.
Bluetooth Low Energy - based soil moisture sensor
Script to read Xiaomi Flora values and publish it via MQTT
Fully C# managed implementation of the BCM2835 library by Mike McCauley (http://www.airspayce.com/mikem/bcm2835/index.html)
The Raspberry Pi's IO Functionality in an easy-to-use API for Mono/.NET/C#
A .NET/Mono IO Library for Raspberry Pi
MCP3002/4/8, MCP3202/4/8 and MCP3304 SPI analog to digital conversion with Node.js
A node.js module for querying an mcp3008 analog/digital converter.
Google's Material Design in XAML & WPF, for C# & VB.Net.
Reverse proxy to front-end appsensor and implement various detection points
Bunch of useful filters for AngularJS (with no external dependencies!)
Gource Quartz Composer for Mac OSX
Signed and unsigned cookies based on Keygrip
Key signing and verification for rotated credentials
Node.js Production Process Manager with a built-in Load Balancer.