Security
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
Here are 577 public repositories matching this topic...
-
Updated
Jun 9, 2020 - Shell
-
Updated
Jun 12, 2020 - Shell
-
Updated
Jun 11, 2020 - Shell
-
Updated
Jun 8, 2020 - Shell
-
Updated
Jun 14, 2020 - Shell
https://github.com/pirate/wireguard-docs/blob/master/README.md#dns-2
Currently it is described as if the setting will be somehow pushed/shared with peers. This is not the case. Instead, DNS servers listed in this key will just be populated on the local interface.
-
Updated
Apr 30, 2020 - Shell
-
Updated
Apr 4, 2020 - Shell
At the moment EC2 audit is raising an issue that I cannot investigate because of the lack of detail:
Warning: VPC has en exposed enpoint
Warning: VPC has en exposed enpoint
Warning: VPC has en exposed enpoint
Warning: VPC has en exposed enpoint
Warning: VPC has en exposed enpoint
Warning: VPC has an exposed enpoint
Warning: VPC has en exposed enpoint
Warni
-
Updated
Sep 16, 2019 - Shell
-
Updated
Feb 10, 2020 - Shell
-
Updated
Feb 16, 2020 - Shell
-
Updated
Jun 2, 2020 - Shell
-
Updated
May 26, 2020 - Shell
.well-known (RFC) is becoming an increasingly popular destination for stashing site-wide metadata. Some of that metadata is relevant to site security or may unintentionally leak information, so we should scan it.
Some starting points:
- Presence of/interesting things in an MTA-STS policy (RFC)
- This might be
WAF detection
-
Updated
Jun 14, 2020 - Shell
-
Updated
May 22, 2020 - Shell
So I took a shot at trying to get this to work with IP V6 addresses with no luck. If I disable the ufw service i'm able to access my site using the V6 address, but when I enable ufw the connection times out. I found /etc/ufw/after6.rules and tried to modify it to work, but I must be doing something wrong. My guess is it's something with the V6 subnet.
# BEGIN UFW AND DOCKER
*filter
:ufw6-u
-
Updated
Apr 24, 2020 - Shell
-
Updated
Oct 21, 2018 - Shell
-
Updated
Jun 14, 2020 - Shell
-
Updated
Mar 22, 2020 - Shell
-
Updated
Jan 19, 2020 - Shell
-
Updated
Mar 11, 2020 - Shell
- Wikipedia
- Wikipedia
Security apps
WhiteSource Bolt
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Renovate
Keep dependencies up-to-date with automated Pull Requests
BackHub
Reliable GitHub repository backup, set up in minutes
Snyk
Find, fix (and prevent!) known vulnerabilities in your code
GuardRails
GuardRails provides continuous security feedback for modern development teams
Dependabot Preview
Automated dependency updates for Ruby, JavaScript, Python, Go, PHP, Elixir, Rust, Java and .NET
Sonatype DepShield
Monitor your open source components for security vulnerabilities - goodbye muda, hello kaizen
LGTM
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
It'd be helpful if there was a check for ELB and ALBs that have either no listeners or no instances in their target pool. The check is similar to an unused security group although their are more financial penalties for having idle ELB and ALBs.