The comprehensive guide for online anonymity and OpSec.
-
Updated
Jul 6, 2024 - HTML
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
The comprehensive guide for online anonymity and OpSec.
Automated threat intel feed parsing and consolidation💻👾🤖
This repository by Sequoia Heights MS offers an integrated solution featuring a probe and client. Our blocklists, sourced from our honeypot network, are freely available. We provide a sync client for up-to-date protection and a probe tool for contributing new data.
🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
Kanidm: A simple, secure and fast identity management platform
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
HackerOne "in scope" domains
Awesome Security lists for SOC/CERT/CTI
Configures an IBM Cloud Security and Compliance instance
The missing REST API package for pfSense
Audit your Node version for known CVEs and patches
Recreation of common Pod Security Policy configuration in other common Kubernetes policy engines
Audit your PHP version for known CVEs and patches
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact provenance.
Oct 29 - 30, 2024 • San Francisco, CA
Protect your app from malicious open source dependencies
Runtime Code Review
We help developers write clean code
Keep dependencies up-to-date with automated Pull Requests
Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support
Automatic daily backups of your GitHub repos and metadata with on-demand restores to protect your business
GuardRails provides continuous security feedback for modern development teams
Backup repositories, metadata and LFS into AWS, Azure, OneDrive, GCP, etc. Pay per repositories, not seats. SOC2 in progress
Find, fix (and prevent!) known vulnerabilities in your code
Code scanning at ludicrous speed. Find bugs and reachable dependency vulnerabilities. Enforce standards on every commit
Detect open source vulnerabilities in real time with suggested fixes for quick remediation