-
Application Security Engineer
- 127.0.0.1
- in/luis-rodriguezcastro
Lists (18)
Sort Name ascending (A-Z)
AI
android-sec
cool tools
electronics/embedded
emulators
FOSS
Game hacking
General AppSec
linux stuff
Malware Analysis
Offensive Tool Dev
βοΈOthers
Phone Assessment
Privacy
programming
Reversing
Scaning and Analysis
Web Assessment
Stars
- All languages
- Adblock Filter List
- Assembly
- Astro
- Batchfile
- BlitzBasic
- C
- C#
- C++
- CSS
- Clojure
- CodeQL
- CoffeeScript
- Dart
- Dockerfile
- Elixir
- Emacs Lisp
- Go
- HCL
- HTML
- Haskell
- Inno Setup
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Modula-3
- Nim
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Solidity
- Svelte
- TeX
- Text
- TypeScript
- Vim Script
- Vue
- WebAssembly
- YARA
π Path to a free self-taught education in Computer Science!
DigitalPlat FreeDomain: Free Domain For Everyone
π§ A list of awesome Linux softwares
An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
Modern C++ Programming Course (C++03/11/14/17/20/23/26)
Defines a common protocol for language servers.
A collection of GPT system prompts and various prompt injection/leaking knowledge.
Gather and update all available and newest CVEs with their PoC.
Sanitize untrusted HTML (to prevent XSS) with a configuration specified by a Whitelist
Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
A curated list of awesome streaming video tools, frameworks, libraries, and learning resources.
These are the labs for my Intro class. Yes, this is public. Yes, this is intentional.
Malware samples, analysis exercises and other interesting resources.
A sorted and updated list of security wargame sites.
A vulnerable version of Rails that follows the OWASP Top 10
Showcasing what in-app browsers do under the hood
OWASP Foundation web repository
My Notes & Resources Of Bug Bounty Checklists
A short video that walks through the basic methodology for a SQL Injection attack.