Security
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
-
- Sign up for GitHub or sign in to edit this page
Here are 8,208 public repositories matching this topic...
A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Nov 5, 2019 - 106 commits
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
-
Updated
Nov 5, 2019 - 778 commits
Security Guide for Developers (实用性开发人员安全须知)
-
Updated
Nov 4, 2019 - 146 commits
I noticed that the advanced installation guide recommends using sudo for installation with pip. This can cause problems because pip and the system package manager disagree on who owns what, and in some cases can actually break the OS.
Instead, I suggest advising to install in a virtualenv, or at least in the user site. I don't have the time now to make a full PR, but here's a suggested wo
Bug report
power_sensors table returns -1.00 value for all power related SMC keys, instead of actual values.
osquery> .all power_sensors;
+------+----------+-------------------+-------+
| key | category | name | value |
+------+----------+-------------------+-------+
| PBLC | power | Battery Rail | -1.00
What would be the best way to back up an Algo deployment? Just thinking about all the users and configs I have and if something were to happen, would not want to redeploy configs.
Any thoughts on this?
List of Computer Science courses with video lectures.
-
Updated
Nov 4, 2019 - 203 commits
Extending and consolidating hosts files from several well-curated sources like adaway.org, mvps.org, malwaredomainlist.com, someonewhocares.org, and potentially others. You can optionally invoke extensions to block additional sites by category.
-
Updated
Nov 4, 2019 - 1 commits
- Python
Work environment
| Questions | Answers |
|---|---|
| OS/arch/bits (mandatory) | Darwin x86_64 |
| File format of the file you reverse (mandatory) | Mach-O |
| Architecture/bits of the file (mandatory) | 64-bit x86_64 executable |
| r2 -v full |
How to improve NGINX performance, security, and other important things; @ssllabs A+ 100%, @mozilla A+ 120/100.
-
Updated
Nov 4, 2019 - 1 commits
- Shell
⚙️ NGiИX config generator on steroids 💉
-
Updated
Nov 5, 2019 - 277 commits
- HTML
An evolving how-to guide for securing a Linux server.
-
Updated
Nov 5, 2019 - 160 commits
Tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.
-
Updated
Nov 4, 2019 - 1 commits
- Java
This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.
-
Updated
Nov 4, 2019 - 706 commits
- PHP
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
-
Updated
Nov 5, 2019 - 166 commits
Mailpile should automatically stop trying to re-check a mailbox/folder which has been deleted from the source/server.
This should be done in such a way that if the mailbox reappears, polling starts again. This should be relatively straightforward, mostly we need to make sure that each individual mailbox type communicates clearly that it's "gone" (not just temporarily unavailable) and the master
They are currently declared as contract. I don't think this is a breaking change.
What happened:
When a customer completes the Quickstart they get this error message.
WARNING: You are using insecure connection to SSH proxy
https://localhost:3080 error: ssh: handshake failed: ssh: principal
"localhost" not in the set of valid principals for given certificate:
["cc91fdc6-81a8-4dc2-88d0-77b4b07e1b16.abdu-ThinkPad-T480" "abdu-ThinkPad-
T480.abdu-ThinkPad-T480"
OAuth2 Server and OpenID Certified™ OpenID Connect Provider written in Go - cloud native, security-first, open source API security for your infrastructure. SDKs for any language.
-
Updated
Nov 4, 2019 - 1 commits
- Go
Security apps
nexploit.app
NexPloit is a Dynamic Application Security scanner powered by Machine learning and modern scanning technologies
LGTM
Find and prevent zero-days and other critical bugs, with customizable alerts and automated code review
GuardRails
GuardRails provides continuous security feedback for modern development teams
SOOHO ODIN
Audit your smart contract files automatically within a blink
Learn about security
- Wikipedia
- Wikipedia
Go over the Caddy 2 code base at some point and see where we can take advantage of inlining for performance improvements. See: https://blog.filippo.io/efficient-go-apis-with-the-inliner/