We have collection of more than 1 Million open source products ranging from Enterprise product to
small libraries in all platforms. We aggregate information from all open source repositories.
Search and find the best for your needs. Check out projects section.
Suhosin is an advanced protection system for PHP installations. It was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. It comes in two independent parts, that can be used separately or in combination.
Script developed in python as a proof of concept for finding bugs through static analysis of the assembly code. The objective is understand the logic of typical vulnerable functions. ItÂ´s important to point out that the main idea of how to get the assembly code (using objdump), parse the output and find probable vulnerable functions comes from a part of IngumaÂ´s project by Joxean Koret.
templatemakerGiven a list of text files in a similar format, templatemaker creates a template that can extract data from files in that same format. The library is written in Python, but the underlying longest-common-substring algorithm is implemented in C for performance. How to downloadGo to the "Downloads" page and download the latest version, 0.1.1. Newer (but not necessarily stable) code is available via Subversion on the "Source" page. Example usageHere's a sample Python interactive interpr
We use strings everyday when we write programs, however C string library is the source of notorious buffer-overflow bugs. As a result, this project is trying to create a C string library that is BOF free. Also, I wish to provide a friendly interface that is easy to use.
Slabosti web aplikacija: Pregled modernih metoda kompromitiranja i zaÅ¡tite sigurnosti webaSadrÅ¾aj:Uvod Napadi i ranjivosti web aplikacija Aspekti sigurnosti Å to je OWASP Napadi na web aplikacije - internet preglednici Å to je to SQLi Napad SQLi propustom Å to je to XSS/CRLF Napad iskoriÅ¡tavanjem XSS/CRLF-a ZaÅ¡tita od XSS/CRLF-a OWASP projekti OWASP Top 10 OWASP projekti sigurnosti IS-a KoriÅ¡tenje alata u svrhu poboljÅ¡anja zaÅ¡tite OpÄ‡i principi napada Metode provjere i neutraliziranja Da