A crate built on top of `axum-sessions`, implementing the CSRF Synchronizer Token Pattern
-
Updated
May 21, 2024 - Rust
A crate built on top of `axum-sessions`, implementing the CSRF Synchronizer Token Pattern
Todo Management Spring Boot 2.0.4.RELEASE) + Spring MVC + Spring Security (simple Login)+ JSP + Hibernate + MySQL + Audit with Envers + CSRF + Synchronizer token
CSRF Synchronizer Token Pattern - PHP
This demostrates Synchronizer Token Pattern for Preventing CSRF attacks. This implementation uses Spring JPA, Spring Security and JSP as Tecnology stack
Prevention of CSRF using Synchronizer Token Pattern
A demo application to showcase the synchronizer token pattern used to overcome CRFS attacks in websites.
Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website where unauthorised commands are transmitted from a user that the web application trusts
Example project to explain how Synchronizer Token Pattern works
Cross-site Request Forgery protection in web application( Used SynchronizerTokenPattern )
This code and the concept explained in my blogpost
Use Django To Introduce CSRF and Cookies , Session 📝
Add a description, image, and links to the synchronizer-token-pattern topic page so that developers can more easily learn about it.
To associate your repository with the synchronizer-token-pattern topic, visit your repo's landing page and select "manage topics."