To easily check Python dependency conflicts/security vulnerabilities.
-
Updated
May 22, 2023 - Python
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
To easily check Python dependency conflicts/security vulnerabilities.
Israel X - Unlocking Information Security I: From Cryptography to Buffer Overflows and Unlocking Information Security II: An Internet Perspective
Effectra\Security is a PHP library that provides security-related functionalities such as hashing, password management, CSRF token handling, and token generation.
A website that outlines the best home security practices
GTU 7th Semester Information security All Practicals Source code
A demonstration of the basic Cyber Security Methods
This program aims to detect Indicator of compromise (IOC) and security issues
This project is a DDOS Attack protection tool built with Python.
Binary Exploitation CTF
Python projects focused on security practices and implementations for enhancing and understanding cybersecurity through code.
Good practices to increase the security of web applications
Manage your passwords in a secure way (accessible to all your devices) without needing to store them anywhere or sync any data; since they're procedurally generated (on demand).
Notes For Learning PHP While My Learning Journey In Web Application Security
A random PIN/Password/Passphrase generator
Oct 29 - 30, 2024 • San Francisco, CA
Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support
Find, fix (and prevent!) known vulnerabilities in your code
Automatic daily backups of your GitHub repos and metadata with on-demand restores to protect your business
GuardRails provides continuous security feedback for modern development teams
Runtime Code Review
Code scanning at ludicrous speed. Find bugs and reachable dependency vulnerabilities. Enforce standards on every commit
Keep dependencies up-to-date with automated Pull Requests
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Backup repositories, metadata and LFS into AWS, Azure, OneDrive, GCP, etc. Pay per repositories, not seats. SOC2 in progress
Protect your app from malicious open source dependencies
We help developers write clean code