security-vulnerability
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 460 public repositories matching this topic...
Simple Repo to Test Echidna
-
Updated
Jun 20, 2022 - Solidity
A very simple protocol which uses approve-tranferFrom flow for tokens deposits
-
Updated
Jan 24, 2023 - JavaScript
Project created during the master's degree in cybersecurity. Collection of code snippets useful to recreate some basic DNS cache poisoning attacks.
-
Updated
Apr 11, 2024 - Python
Create a Notice with file uploading and view them .You can search data and sort accordingly.
-
Updated
Jul 19, 2016 - PHP
-
Updated
May 4, 2020 - PHP
Dự án phát triển website giải trí đa phương tiện
-
Updated
Jan 16, 2021 - HTML
-
Updated
Apr 24, 2020
Simple URL Shortener Web Application
-
Updated
May 15, 2021 - PHP
WESSy stands for Web Endpoint Security Scorecard. This Python code scans for legacy crypto &/or software components, public-facing cloud storage repositories, open TCP ports, server configuration gaps, as well as data injection vulnerabilities.
-
Updated
Jan 28, 2021 - Python
A small web application vulnerable to SQL INJECTION attacks
-
Updated
Apr 2, 2023 - TypeScript
google dork hacking tool
-
Updated
Jun 2, 2022 - Python
-
Updated
Jan 5, 2023 - PHP
-
Updated
Jul 11, 2016 - PHP
penetration testing and security assessment
-
Updated
Apr 15, 2023 - PHP
HackerOne library for generating api clients with swagger.
-
Updated
Nov 25, 2019 - HTML
Automate API security testing for your apps and APIs with FAST and CircleCI
-
Updated
May 6, 2020
Sample Kubernetes application to demonstrate DevSecOps principles in AWS CodePipelines by leveraging Aqua CSP
-
Updated
May 22, 2020 - PHP
This online course app is my school project.
-
Updated
Mar 7, 2021 - Blade
- Followers
- 36k followers
- Wikipedia
- Wikipedia