Stars
This is the all of the pdf of Head First series
程序员常读书单整理,附下载地址,希望对你有帮助。书单包括设计模式、计算机网络、操作系统、数据库、数据结构与算法、架构、中间件等等。本仓库持续更新中,可以star一下,下次找书直接在上面搜索
【Java面试+Java学习指南】 一份涵盖大部分Java程序员所需要掌握的核心知识。
Some payloads of JNDI Injection in JDK 1.8.0_191+
Nop Platform 2.0 is a next-generation low-code development platform built from scratch based on the principles of reversible computation, adopting a language-oriented programming paradigm. It inclu…
Cloud native networking and network security
Web app that provides basic navigation and annotation of ATT&CK matrices
Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernet…
Pre-Built Vulnerable Environments Based on Docker-Compose
mitmproxy implemented with golang. 用 Golang 实现的中间人攻击(Man-in-the-middle),解析、监测、篡改 HTTP/HTTPS 流量。
A golang ebpf libary based on cilium/ebpf and datadog/ebpf.
Capturing SSL/TLS plaintext without a CA certificate using eBPF. Supported on Linux/Android kernels for amd64/arm64.
WillTang2018 / ReDoSHunter
Forked from yetingli/ReDoSHunterReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS Detection
The project has been migrated to @wolf-table/table https://github.com/wolf-table/table
A Python implementation of the Wiener attack on RSA public-key encryption scheme.
JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)
Fastjson vulnerability quickly exploits the framework(fastjson漏洞快速利用框架)
Dongtai IAST is an open-source Interactive Application Security Testing (IAST) tool that enables real-time detection of common vulnerabilities in Java applications and third-party components throug…