🔐 Security advisories as a simple composer exclusion list, updated daily
-
Updated
Dec 2, 2024
🔐 Security advisories as a simple composer exclusion list, updated daily
finds publicly known security vulnerabilities in a website's frontend JavaScript libraries
QuillAudits Smart Contracts, deFi, NFT, tokens,Dao , Dex and DApps Audit Reports
AutoVAS is an automated vulnerability analysis system with a deep learning approach.
Checkmarx Scan Github Action
LSVerifier - Large Systems Verifier
Docker Image Security Workshop for Best Practices
Security tools that you can inject into devops
WordPress Security Advisories. Add this package to prevent vulnerable WordPress packages from being installed.
A Laravel package with an encryptable trait to manage encrypting database table fields
Wiki for common Security Vulnerabilities - Nessus Wiki
Dockerfiles, setup instructions, code and write-ups for hands-on exploration of Carsten Eiler's book "You've Been Hacked" on security vulnerabilities in web applications.
A project for exploring common security vulnerabilities in web applications
Security assessment of a RESTful distributed computing application. I acted as a cybersecurity consultant, identifying vulnerabilities and providing a mitigation plan. (Software Security course project)
A Node app to save the contents of GitHub's Vulnerability Database to a JSON file.
technical exploration of cross-chain bridge vulnerabilities in decentralized finance (DeFi) systems. Cross-chain bridges allow the transfer of assets between different blockchain ecosystems but often present critical security challenges.
Add a description, image, and links to the security-vulnerabilities topic page so that developers can more easily learn about it.
To associate your repository with the security-vulnerabilities topic, visit your repo's landing page and select "manage topics."