Vulnerable app with examples showing how to not use secrets
-
Updated
Jun 2, 2024 - Java
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Vulnerable app with examples showing how to not use secrets
HackerOne "in scope" domains
A tool that allows you to convert NMAP results to html, csv, json, markdown, graphviz (dot), sqlite, excel and d2-lang. Simply put it's nmap converter.
(WIP) 🔐 A modern decentralized and private messenger with end-to-end encryption.
Data Parsing and schema declaration Library
Security Token Exchange Client module for the Apache HTTPd webserver
List of IP addresses which attacked my SIP IP PBX in the last 30 days
The comprehensive guide for online anonymity and OpSec.
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
A diverse collection of privacy, security, and FOSS resources in English and Arabic, encompassing tools, extensions, operating systems, encryption, and more. An invaluable repository for bolstering digital security and privacy.
Blocklist for newly created scam and phishing domains automatically retrieved daily using Google Search API, automated detection, and other public sources.
This repository by Sequoia Heights MS offers an integrated solution featuring a probe and client. Our blocklists, sourced from our honeypot network, are freely available. We provide a sync client for up-to-date protection and a probe tool for contributing new data.
An auto-updating list of shodan dorks with info on the amount of results they return!
The Open Security Summit is focused on the collaboration between, Developers and Application Security
nix2sbom extracts the SBOM (Software Bill of Materials) from a Nix derivation
Runtime Code Review
GuardRails provides continuous security feedback for modern development teams
Find, fix (and prevent!) known vulnerabilities in your code
Protect your app from malicious open source dependencies
Code scanning at ludicrous speed. Find bugs and reachable dependency vulnerabilities. Enforce standards on every commit
Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support
Backup repositories, metadata and LFS into AWS, Azure, OneDrive, GCP, etc. Pay per repositories, not seats. SOC2 in progress
Automatic daily backups of your GitHub repos and metadata with on-demand restores to protect your business
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Keep dependencies up-to-date with automated Pull Requests
We help developers write clean code