TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.
#学习与技能提升#SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to create informational content in multiple formats and share with the...
Web Application Secure Coding Handbook resource.
翻译 - Web 应用程序安全编码手册资源。
A burp suite extension that reviews backup, old, temporary and unreferenced files on web server for sensitive information (OWASP WSTG-CONF-04, OTG-CONFIG-004)
#安卓#Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)
this repository is a docker containing some "XSS vulnerability" challenges and bypass examples.
This repository is a dockerized PHP application containing some file upload vulnerability challenges (scenarios).
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about General Data Protection Regulation (GDPR).
Hybrid Encryption RSA + AES in Swift
#IOS#Flutter plugin to verify the integrity of the app and detect if it has been tampered at run time.
Provides different utilities methods to apply processing from a security perspective.
This repository hosts DSP AppSec internal infrastructure apps deployed in GKE.
This repository is a dockerized PHP application containing some captcha logical bypass challenges (scenarios).
Optimize your web vulnerability assessments with PassiveDigger, a comprehensive Burp Suite extension that specializes in passive traffic analysis. Detect potential vulnerabilities, get actionable insi...
#IOS#Simplify user verification and enhance security with tokenized captcha handling in React Native using Google Recaptcha V3
#IOS#SafeLock is demonstration app for how to integrate FaceID in iOS project
Pipeline SAST, DAST, SCA in GitLab CI\CD and push reports to VM
IBM Applied DevOps Engineering Professional Certificate.
Powerful and Flexible File Validation Library for Java
#博客#Api Tech Blog about Joomla Web Services mainly focused on defensive security "blue team" principles