liebhartdevelopment's starred repositories
MagiskOnWSA
Integrate Magisk root and Google Apps (OpenGApps) into WSA (Windows Subsystem for Android)
log4j-scan
A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
Ukraine-Cyber-Operations
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
Django-4-by-example
Django 4 by example (4th Edition) published by Packt
log4j-payload-generator
Log4j jndi injects the Payload generator
JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
support-desk
Support ticket app built with the MERN stack
pythonizing_nmap
A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.
Mastering-Python-for-Networking-and-Security-Second-Edition
Mastering Python for Networking and Security, Second Edition, published by Packt
corsair_scan
Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).
Mastering-React-Test-Driven-Development-Second-Edition
Mastering React Test-Driven Development, published by Packt
React-Projects-Second-Edition
React Projects Second Edition, Published by Packt
Python-for-Geeks
Python for Geeks, published by Packt
Blazor-WebAssembly-by-Example
Blazor WebAssembly by Example, published by Packt
Secure_Kali
How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports or launch attacks against your apache web server and more
Mastering-Kali-Linux-for-Advanced-Penetration-Testing-4E
Mastering Kali Linux for Advanced Penetration Testing 4E published by Packt
Becoming-an-Enterprise-Django-Developer
Becoming an Enterprise Django Developer, Published by Packt
Threat-Hunting-with-Elastic-Stack
Threat Hunting with Elastic Stack, Published by Packt
SMB-Data-Discovery
A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file contents for sensitive information.