Lists (1)
Sort Name ascending (A-Z)
Stars
《Hello 算法》:动画图解、一键运行的数据结构与算法教程。支持 Python, Java, C++, C, C#, JS, Go, Swift, Rust, Ruby, Kotlin, TS, Dart 代码。简体版和繁体版同步更新,English version in translation
mall项目是一套电商系统,包括前台商城系统及后台管理系统,基于Spring Boot+MyBatis实现,采用Docker容器化部署。 前台商城系统包含首页门户、商品推荐、商品搜索、商品展示、购物车、订单流程、会员中心、客户服务、帮助中心等模块。 后台管理系统包含商品管理、订单管理、会员管理、促销管理、运营管理、内容管理、统计报表、财务管理、权限管理、设置等模块。
Ghidra is a software reverse engineering (SRE) framework
Alibaba Java Diagnostic Tool Arthas/Alibaba Java诊断利器Arthas
A tool for reverse engineering Android apk files
Change data capture for a variety of databases. Please log issues at https://issues.redhat.com/browse/DBZ.
Access your entire server infrastructure from your local desktop
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
LSPatch: A non-root Xposed framework extending from LSPosed
JingMatrix / LSPosed
Forked from LSPosed/LSPosedLSPosed Framework resuscitated
Runtime code generation for the Java virtual machine.
Android Permissions Framework, Adapt to Android 15
SpringBoot 相关漏洞学习资料,利用方法和技巧合集,黑盒安全评估 check list
An xposed module that disables SSL certificate checking for the purposes of auditing an app with cert pinning
An Open Source Java Decompiler Gui for Procyon
the fastest and most powerful android decompiler(native tool working without Java VM) for the APK, DEX, ODEX, OAT, JAR, AAR, and CLASS file. which supports malicious behavior detection, privacy lea…
Allows you to emulate an Android native library, and an experimental iOS emulation
Unofficial mirror of FernFlower Java decompiler (All pulls should be submitted upstream)
HaE - Highlighter and Extractor, Empower ethical hacker for efficient operations.
This is a tool to repackage apk file, then the apk can load any xposed modules installed in the device. It is another way to hook an app without root device.
JNDI注入测试工具(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,etc)
Java安全相关的漏洞和技术demo,原生Java、Fastjson、Jackson、Hessian2、XML反序列化漏洞利用和Spring、Dubbo、Shiro、CAS、Tomcat、RMI、Nexus等框架\中间件\功能的exploits以及Java Security Manager绕过、Dubbo-Hessian2安全加固等等实践代码。
Java web common vulnerabilities and security code which is base on springboot and spring security