laws of cryptography data security developers should be familiar with.
-
Updated
Mar 19, 2023 - JavaScript
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
laws of cryptography data security developers should be familiar with.
To easily check Python dependency conflicts/security vulnerabilities.
Israel X - Unlocking Information Security I: From Cryptography to Buffer Overflows and Unlocking Information Security II: An Internet Perspective
Generate cryptographically secure passwords fast, insert with a click. Try the Google Chrome plugin White Hat Password Generator and safely make passwords.
Effectra\Security is a PHP library that provides security-related functionalities such as hashing, password management, CSRF token handling, and token generation.
GTU 7th Semester Information security All Practicals Source code
A website that outlines the best home security practices
Auditing and compliance measures in an online banking system
A demonstration of the basic Cyber Security Methods
Simple Python Projects using Tkinter
Ruby on Rails guide, checklist, and tips for security audits and best practices
This program aims to detect Indicator of compromise (IOC) and security issues
Binary Exploitation CTF
This project is a DDOS Attack protection tool built with Python.
Document a personal approach to GPG keys managment.
Find, fix (and prevent!) known vulnerabilities in your code
Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support
Runtime Code Review
Protect your app from malicious open source dependencies
Automatic daily backups of your GitHub repos and metadata with on-demand restores to protect your business
Code scanning at ludicrous speed. Find bugs and reachable dependency vulnerabilities. Enforce standards on every commit
GuardRails provides continuous security feedback for modern development teams
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Backup repositories, metadata and LFS into AWS, Azure, OneDrive, GCP, etc. Pay per repositories, not seats. SOC2 in progress
We help developers write clean code
Keep dependencies up-to-date with automated Pull Requests