Lists (1)
Sort Name ascending (A-Z)
Stars
📚 Freely available programming books
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
The Definitive Guide to Elasticsearch
Demo: https://diafygi.github.io/webrtc-ips/
🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
Canarytokens helps track activity and actions on your network.
Just use pyecharts to imitate Echarts official example.
Tracking interesting Linux (and UNIX) malware. Send PRs
欧港新CS留学项目指北
A library of pretexts to use on offensive phishing engagements.