An Android library that prevents your app from being pirated / cracked using Google Play Licensing (LVL), APK signature protection and more. This library applies some techniques to help protect your app's users and attempt to thwart reverse engineers and attackers. BUT, this isn't guaranteed to stop your app from getting pirated. There is no such thing as 100% security, and a determined and skilled attacker with enough time, could remove these checks from the code. The real objective here is to raise the bar out of reach of opportunist and automatic attackers.
apk signature android-library attacker lvl apk-signature-protection verify gradleThis is the official repository for the Cowrie SSH and Telnet Honeypot effort. Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker.
cowrie honeypot ssh telnet security kippo cowrie-ssh telnet-honeypot sftp scp attacker threat-analysis threat-sharing threatintelAuthenticate against a MySQL server without knowing the cleartext password. This PoC shows how it is possible to authenticate against a MySQL server under certain circumstances without knowing the cleartext password when the Secure Password Authentication authentication plugin (aka mysql_native_password, the default method) is used.
mysql sha1 authentication password bypass sniffer attacker pocSkyArk is a cloud security project with two helpful sub-modules - AWStealth and AWStrace. To help the cloud community in the effort of making cloud environments more secure. SkyArk currently focuses on mitigating the new threat of Cloud Shadow Admins, and helps organizations to discover, validate and protect cloud privileged entities. Stealthy and undercover cloud admins may reside in every public cloud platform and the tool at this time helps to mitigate the risk in AWS. In defensive/pentest/risk assessment procedures - make sure to address the threat and validate that those privileged entities are indeed well secured.
cloud-security powershell security-tools privileges cloud aws admins attacker threat
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.