Analyzes your Java Maven Project dependencies for security issues and technical debts (CVE/EOL/+).
-
Updated
Feb 9, 2021 - Java
Analyzes your Java Maven Project dependencies for security issues and technical debts (CVE/EOL/+).
Repo for Security class - Hacks and defenses against common threats and vulnerabilities
C4T BuT S4D Attack-Defence training
RuCTFE 2018. Developed with ♥ by Hackerdom team
Ever been rejected on bug bounty? Well send me your reports to give them a second chance. This includes, but is not limited to - XSS, SQL Injection, Code Execution, Deface, Login Bypass and much more.
Repository for COMP.SEC.300 Secure Programming Course
A list of security vulnerabilities discovered over the years from both personal and collaborative cybersecurity research.
Assignments for COSC3371 Cybersecurity taken at the University Of Houston
The approach consists of first extracting the graphical representation of source code, then creating a mixed representation of the three most important representations AST, CFG, and PDG, then benchmarking the performance of every combination with a graphical neural network.
List of vulnerabilities that I discovered.
🎯 List of publicly disclosed application vulnerabilities that I found, reported and were attributed to me.
Application Security Vulnerability Findings, Exploits & OWASP Contributions
Old project. A Spring MVC web application with a XML configuration. Vulnerabilities are present.
PowerShell Webserver Security Report
Add a description, image, and links to the vulnerabilities topic page so that developers can more easily learn about it.
To associate your repository with the vulnerabilities topic, visit your repo's landing page and select "manage topics."