Pen Test Report Generation and Assessment Collaboration
- Updated
Oct 27, 2025 - Java
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Pen Test Report Generation and Assessment Collaboration
A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat landscape such as cloud ransomware and supply chain attacks.
Key establishment using KDC server.
Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告
Aulas, exercícios e resumos da matéria: segurança da informação.
Tiny simple interception tool for TP-LINK "Easy Smart"-managed device configuration using the TP-LINK "Easy Smart Configuration Utility"
The Good Parts of Application Security: learn how to build and test secure webapps
Proof of Concept - RCE Exploitation : Web Shell on Apache Tomcat - Ensimag January 2018
Demonstrates securing a Jakarta EE application using a database-backed IdentityStore, JPA persistence, and container-managed JDBC connection pooling.
An experiment for learning purposes
A basic repository for Android Malware Detenction Analysis
Philly Codefest Project: A school security software application built in Java that works to prevent school shootings and other threats.
Example of certificate pinning on Android