security-vulnerability
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 461 public repositories matching this topic...
Selenium Entegration for https://haveibeenpwned.com/
-
Updated
Jan 13, 2020 - Python
Command line client for CVEs
-
Updated
Dec 2, 2019 - Go
A telegram robot which can be used to search cve related stuff
-
Updated
Apr 11, 2018 - Python
-
Updated
May 4, 2020 - PHP
Dự án phát triển website giải trí đa phương tiện
-
Updated
Jan 16, 2021 - HTML
-
Updated
Apr 24, 2020
Simple URL Shortener Web Application
-
Updated
May 15, 2021 - PHP
WESSy stands for Web Endpoint Security Scorecard. This Python code scans for legacy crypto &/or software components, public-facing cloud storage repositories, open TCP ports, server configuration gaps, as well as data injection vulnerabilities.
-
Updated
Jan 28, 2021 - Python
PayloadAllTheThings as a website using mkdocs
-
Updated
Sep 9, 2022
A small web application vulnerable to SQL INJECTION attacks
-
Updated
Apr 2, 2023 - TypeScript
-
Updated
Jan 5, 2023 - PHP
Some proxies vulnerabilities
-
Updated
Jan 30, 2023 - JavaScript
Tiny simple interception tool for TP-LINK "Easy Smart"-managed device configuration using the TP-LINK "Easy Smart Configuration Utility"
-
Updated
Sep 5, 2017 - Java
Project to demonstrate common security issues facing modern web applications.
-
Updated
Apr 10, 2018 - JavaScript
Vulnerable application is test case study for check protection mechanism.
-
Updated
Jan 25, 2022 - PHP
A conference web application
-
Updated
Aug 15, 2022 - HTML
Simple Repo to Test Echidna
-
Updated
Jun 20, 2022 - Solidity
A very simple protocol which uses approve-tranferFrom flow for tokens deposits
-
Updated
Jan 24, 2023 - JavaScript
Sistem Manajemen Kuesioner Kampus
-
Updated
Jan 23, 2021 - Vue
- Followers
- 36.1k followers
- Wikipedia
- Wikipedia