Stars
- All languages
- ActionScript
- Batchfile
- Bikeshed
- Blade
- C
- C#
- C++
- CMake
- CSS
- Clojure
- Dockerfile
- F#
- Go
- HTML
- Haskell
- Isabelle
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Makefile
- Markdown
- Meson
- OCaml
- Objective-C
- PHP
- PLpgSQL
- Pawn
- Python
- Ruby
- Rust
- Shell
- Solidity
- Swift
- TeX
- TypeScript
- Verilog
- Vim Script
- Vim Snippet
- Vue
- WebAssembly
A complete computer science study plan to become a software engineer.
Top Writeups for CodeEngn Challenges
Smartian: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses (ASE '21)
Kubernetes focused container assessment and context discovery tool for penetration testing
Restricting interpreters and script files in the Linux system
Proof-of-concept codes created as part of security research done by Google Security Team.
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
Monitoring, visualisation & management for Docker & Kubernetes
Kubernetes RBAC authorizing HTTP proxy for a single upstream.
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
A Flutter plugin for securely storing sensitive data using encrypted storage.
Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark
The best way to build Electron apps with security in mind.
Google Omaha ("Chromium Update") server
Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron applications.
Store securely encrypted backups in the cloud!
TrailDB is an efficient tool for storing and querying series of events
Burpsuite Extension to bypass 403 restricted directory
Bandit is a tool designed to find common security issues in Python code.
For effective cheating detection in security competitions. Uses Linux Kernel Module (LKM) for generating flags.