Stars
SpotBugs is FindBugs' successor. A tool for static analysis to look for bugs in Java code.
The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)
dkkacceler / DirBrute
Forked from Xyntax/DirBrute多线程WEB目录爆破工具 [Multi-thread WEB directory blasting tool(with dics inside) ]
dkkacceler / webshell
Forked from tennc/webshellThis is a webshell open source project
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
🐍 A toolkit for testing, tweaking and cracking JSON Web Tokens
A demo for using JWT (Json Web Token) with Spring Security and Spring Boot 2
Java 1-24 Parser and Abstract Syntax Tree for Java with advanced analysis functionalities.
Compilers Principles, Techniques, & Tools (purple dragon book) second edition exercise answers. 编译原理(紫龙书)第2版习题答案。
A curated list of awesome C++ (or C) frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.
A Collection of Chrome Sandbox Escape POCs/Exploits for learning
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Issues with WebSocket reverse proxying allowing to smuggle HTTP requests
Android/iOS video player based on FFmpeg n3.4, with MediaCodec, VideoToolbox support.
梆梆企业加固详细逆向分析过程, 包含两种对该加固的脱壳机(直接解密classes0.jar和基于frida hook)
2018-2020青年安全圈-活跃技术博主/博客
Hystrix is a latency and fault tolerance library designed to isolate points of access to remote systems, services and 3rd party libraries, stop cascading failure and enable resilience in complex di…
Implementation of various string similarity and distance algorithms: Levenshtein, Jaro-winkler, n-Gram, Q-Gram, Jaccard index, Longest Common Subsequence edit distance, cosine similarity ...
ijkPlayer的集成 arm和x86的.so库,可半屏滑动改变亮度和音量,双击改变画面比例 bilibili
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…