To easily check Python dependency conflicts/security vulnerabilities.
-
Updated
May 22, 2023 - Python
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
To easily check Python dependency conflicts/security vulnerabilities.
Israel X - Unlocking Information Security I: From Cryptography to Buffer Overflows and Unlocking Information Security II: An Internet Perspective
A website that outlines the best home security practices
GTU 7th Semester Information security All Practicals Source code
Effectra\Security is a PHP library that provides security-related functionalities such as hashing, password management, CSRF token handling, and token generation.
A demonstration of the basic Cyber Security Methods
This project is a DDOS Attack protection tool built with Python.
This program aims to detect Indicator of compromise (IOC) and security issues
Binary Exploitation CTF
Python projects focused on security practices and implementations for enhancing and understanding cybersecurity through code.
Good practices to increase the security of web applications
Notes For Learning PHP While My Learning Journey In Web Application Security
A random PIN/Password/Passphrase generator
Manage your passwords in a secure way (accessible to all your devices) without needing to store them anywhere or sync any data; since they're procedurally generated (on demand).
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Automatic daily backups of your GitHub repos and metadata with on-demand restores to protect your business
Protect your app from malicious open source dependencies
Runtime Code Review
We help developers write clean code
Code scanning at ludicrous speed. Find bugs and reachable dependency vulnerabilities. Enforce standards on every commit
Find, fix (and prevent!) known vulnerabilities in your code
Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support
Backup repositories, metadata and LFS into AWS, Azure, OneDrive, GCP, etc. Pay per repositories, not seats. SOC2 in progress
Keep dependencies up-to-date with automated Pull Requests
GuardRails provides continuous security feedback for modern development teams