-
Datarisk.io
- Brazil
-
08:07
(UTC -03:00) - https://gaio.dev/
- in/vinicius-gajo
- https://exercism.org/profiles/64J0
- https://www.hackerrank.com/V64J0
- https://leetcode.com/64J0/
π Security
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
Manage secret values in-repo via public key cryptography
Hunt for security weaknesses in Kubernetes clusters
Emacs Lisp Static Analyzer and gradual type system.
Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
π A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
HomePwn - Swiss Army Knife for Pentesting of IoT Devices
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A vulnerability scanner for container images and filesystems
Snyk CLI scans and monitors your projects for security vulnerabilities.
How to systematically secure anything: a repository about security engineering
Home to the Signal Protocol as well as other cryptographic primitives which make Signal possible.
A private messenger for Windows, macOS, and Linux.
Web application that allows to load a Trivy report in json format and displays the vulnerabilities of a single target in an interactive data table.
Hunt down social media accounts by username across social networks
ShellCheck, a static analysis tool for shell scripts
βοΈ A curated list of static analysis (SAST) tools and linters for all programming languages, config files, build tools, and more. The focus is on tools which improve code quality.
Exploitation Framework for Embedded Devices
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and thβ¦
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course
A collection of phishing samples for researchers and detection developers.
In-depth attack surface mapping and asset discovery