Displaying 1 to 15 from 15 results

awesome-web-security - 🐶 A curated list of Web Security materials and resources.

  •    

🐶 Curated list of Web Security materials and resources.Needless to say, most of websites on-line are suffered from various type of bugs, which might eventually lead to vulnerabilities. Why would this happen so often? Many factors can be involved, including misconfiguration, shortage of engineers' security skills, and etc. Therefore, here is the curated list of Web Security materials and resources for learning the cutting edge penetrating techniques.

awesome-security - A collection of awesome software, libraries, documents, books, resources and cools stuffs about security

  •    

A collection of awesome software, libraries, documents, books, resources and cool stuff about security. Inspired by awesome-php, awesome-python.

android-security-awesome - A collection of android security related resources

  •    

A collection of android security related resources. Other amazingly awesome lists can be found in the awesome-awesomeness list.

awesome-threat-detection - A curated list of awesome threat detection and hunting resources

  •    

Contributions welcome! Read the contribution guidelines first. To the extent possible under law, Adel "0x4D31" Karimi has waived all copyright and related or neighboring rights to this work.




pi-timolo - Raspberry PI-TIMOLO ( PI-TImelapse, MOtion, LOwLight ) uses RPI picamera and python for Remote Headless Security Monitoring & Auto Sync files with rclone remote storage services

  •    Python

Requires a Raspberry Pi computer and a RPI camera module installed. Make sure hardware is tested and works. Most RPI models will work OK. A quad core RPI will greatly improve performance due to threading. A recent version of Raspbian operating system is Recommended. Step 1 With mouse left button highlight curl command in code box below. Right click mouse in highlighted area and Copy. Step 2 On RPI putty SSH or terminal session right click, select paste then Enter to download and run script.

awesome-security-trivia - 🤙 Security Trivia that rare people know.

  •    

✍️ A curated list of Security Trivia.Here is a collection about Security Trivia, and you might also want to check out awesome-web-security.

awesome-ocap - Awesome Object Capabilities and Capability Security

  •    

Capability-based security enables the concise composition of powerful patterns of cooperation without vulnerability. What Are Capabilities? explains in detail. Shill: Shill is a shell scripting language designed to make it easy to follow the Principle of Least Privilege. It runs on FreeBSD and is developed in Racket.


awesome-secure-messaging - A curated collection of links for secure messaging.

  •    

A curated collection of links for secure messaging. Part of the "Awesome X" series. The list is periodically updated with new links. Click "Watch" in the right top corner to follow.

solidity-audit-checklist - A checklist of things to look for when auditing Solidity smart contracts.

  •    

A checklist of things to look for when auditing Solidity smart contracts. This is not a comprehensive list and solidity is quickly evolving so please do due dilegence on your part.

awesome-buggy-erc20-tokens - A Collection of Vulnerabilities in ERC20 Smart Contracts With Tokens Affected

  •    Python

ERC20 Token specification has gone through challenges and improvements during its growth. Lots of critical security issues have been revealed, some of which have led to severe financial losses [2-11] for developers, investors, even Ethereum community as well. On June 18th, 2016, the DAO hack caused a total loss of over 3,600,000 ethers(ETH) worth over a billion dollars, and the Ethereum hard-fork afterwards led to the Ethereum community breaking apart [2].

awesome-embedded-and-iot-security - A curated list of awesome embedded and IoT security resources.

  •    Javascript

A curated list of awesome resources about embedded and IoT security. The list contains software and hardware tools, books, research papers and more. Botnets like Mirai have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic. If you are a beginner, you should have a look at the Books and Case Studies sections. If you want to start right away with your own analysis, you should give the Analysis Frameworks a try. They are easy to use and you do not need to be an expert to get first meaningful results.

awesome-security-audits - A collection of public security audits.

  •    

A collection of public security audits / application penetration tests sorted by programming language.