security-vulnerability
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 461 public repositories matching this topic...
Selenium Entegration for https://haveibeenpwned.com/
-
Updated
Jan 13, 2020 - Python
Command line client for CVEs
-
Updated
Dec 2, 2019 - Go
A telegram robot which can be used to search cve related stuff
-
Updated
Apr 11, 2018 - Python
-
Updated
May 4, 2020 - PHP
Dự án phát triển website giải trí đa phương tiện
-
Updated
Jan 16, 2021 - HTML
-
Updated
Apr 24, 2020
Simple URL Shortener Web Application
-
Updated
May 15, 2021 - PHP
WESSy stands for Web Endpoint Security Scorecard. This Python code scans for legacy crypto &/or software components, public-facing cloud storage repositories, open TCP ports, server configuration gaps, as well as data injection vulnerabilities.
-
Updated
Jan 28, 2021 - Python
PayloadAllTheThings as a website using mkdocs
-
Updated
Sep 9, 2022
A small web application vulnerable to SQL INJECTION attacks
-
Updated
Apr 2, 2023 - TypeScript
-
Updated
Jan 5, 2023 - PHP
Some proxies vulnerabilities
-
Updated
Jan 30, 2023 - JavaScript
-
Updated
Jul 11, 2016 - PHP
penetration testing and security assessment
-
Updated
Apr 15, 2023 - PHP
HackerOne library for generating api clients with swagger.
-
Updated
Nov 25, 2019 - HTML
Sample Kubernetes application to demonstrate DevSecOps principles in AWS CodePipelines by leveraging Aqua CSP
-
Updated
May 22, 2020 - PHP
This online course app is my school project.
-
Updated
Mar 7, 2021 - Blade
Mise en ligne du projet "agenda" pour partage entre étudiants
-
Updated
Jun 17, 2021 - PHP
Project in Django Python on theme Security vulnerabilites - Sensitive data exposure, Broken Access Control.
-
Updated
Feb 8, 2023 - Python
- Followers
- 36.1k followers
- Wikipedia
- Wikipedia