Security
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 8,475 public repositories matching this topic...
A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Dec 17, 2019
Fast, cross-platform HTTP/2 web server with automatic HTTPS
-
Updated
Dec 16, 2019 - Go
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
-
Updated
Dec 16, 2019
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
-
Updated
Dec 17, 2019 - Python
SQL powered operating system instrumentation, monitoring, and analytics.
-
Updated
Dec 17, 2019 - C++
What would be the best way to back up an Algo deployment? Just thinking about all the users and configs I have and if something were to happen, would not want to redeploy configs.
Any thoughts on this?
Extending and consolidating hosts files from several well-curated sources like adaway.org, mvps.org, malwaredomainlist.com, someonewhocares.org, and potentially others. You can optionally invoke extensions to block additional sites by category.
-
Updated
Dec 16, 2019 - Python
Should mention CORS
It looks like most of the advice from the OWASP REST Cheat Sheet is discussed in this API-Security-Checklist, but OWASP talks about the importance of CORS, which is not mentioned at all in this API-Security-Checklist. Probably good to make mention. Also, the OWASP REST Cheat Sheet provides a bit more guidance regarding validation that might be good to incorporate.
List of Computer Science courses with video lectures.
-
Updated
Dec 16, 2019
unix-like reverse engineering framework and commandline tools
-
Updated
Dec 16, 2019 - C
When you're viewing a cheatsheet on the https://cheatsheetseries.owasp.org website it isn't immediately obvious that the content is pulled from GitHub, or how you could contribute to the project on the cheatsheets themselves (although there is a note at the bottom of the homepage).
Making this more obvious in the sheets themselves will encourage people to contribute (or at least raise issues).
How to improve NGINX performance, security, and other important things; @ssllabs A+ 100%, @mozilla A+ 120/100.
-
Updated
Dec 16, 2019 - Shell
On step 2 of Secure /etc/ssh/sshd_config, a quick and dirty way to find any duplicate parameter is with:
awk '{print $1}' /etc/ssh/sshd_config | sort | uniq -c | grep -v ' 1 '
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
-
Updated
Dec 16, 2019 - Java
Would it make sense to add this project to the list of password managers on Wikipedia?
Which lab is it that you're having issues with?
Lab: Docker for Java Developers
Description
When deploying Java applications in production one usually specifies the amount of memory available to the JVM (-Xmx) and other assorted configuration settings. Unfortunately, this is (usually) static configuration and therefore fixed in the container image. When specifying memory constraints
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
-
Updated
Dec 16, 2019
They are currently declared as contract. I don't think this is a breaking change.
Just a documentation bug I noticed.
https://www.ory.sh/docs/next/hydra/sdk/api#introspect-oauth2-tokens contains the following text:
"To perform this operation, you must be authenticated by means of one of the following methods: basic, oauth2"
This endpoint is available on the admin port and doesn't require any authentication.
- Wikipedia
- Wikipedia
Security apps
ODIN
Audit your smart contract files automatically within a blink
Extant DevSecOps
Speed up your remediation cycles for security vulnerabilities with Extant DevSecOps pipeline tools
Dependabot Preview
Automated dependency updates for Ruby, JavaScript, Python, Go, PHP, Elixir, Rust, Java and .NET
LGTM
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
I wrote an article to cover this security problem https://dzone.com/articles/regular-expressions-denial.
It is a good practice that developers do Unit Testing when using Regular Expressions.