How to Process Passwords as a Software Developer - DEV Community 👩💻👨💻
Sécurité
anouarbensaad/vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `} - anouarbensaad/vulnx
OWASP API Security Project - OWASP
security.txt | A proposed standard which allows websites to define security policies
A proposed standard which allows websites to define security policies.
trustedsec/physical-docs
This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselve...
Naked Security
Computer Security News, Advice and Research
Ars Technica
Serving the Technologist for more than a decade. IT news, reviews, and analysis.
Threatpost | The first stop for security news
Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.
Technology News, Analysis, Comments and Product Reviews for IT Professionals
ZDNet's breaking news, analysis, and research keeps business technology professionals in touch with the latest IT trends, issues and events.
BleepingComputer
BleepingComputer.com is a premier destination for computer users of all skill levels to learn how to use and receive support for their computer.
Morning Hacked – Cybersecurity news in your inbox every weekday, in the morning!
~this week in security~
~this week in security~ Email Forms
SQL Injection Tutorial for Beginners
SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements that control a web application’s database server.
Open Source Security Platform
Snyk helps you use open source and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and much more.
Eliminating Known Vulnerabilities With Snyk
The way we consume **open source software (OSS) dramatically changed** over the past decade or two. Flash back to the early 2000s, we mostly used large OSS projects from a small number of providers, such as Apache, MySQL, Linux and OpenSSL. These projects came from well-known software shops that maintained good development and quality practices. It wasn’t our code, but it felt trustworthy, and it was safe to assume it didn’t hold more bugs than our own code. Fast-forward to today and OSS has turned into crowd-sourced marketplaces. Node’s npm carries over 210,000 packages from over 60,000 co...
Analyse your HTTP response headers
Quickly and easily assess the security of your HTTP response headers
Web Security Academy – Cybersecurity Training from PortSwigger
Welcome to the Web Security Academy. This is a free learning resource on web security provided by PortSwigger. Free web security training The Web Security ...
The most common types of ATO attacks
Whether you're new to security or a veteran, you need to stay up to date on threats. Learn what ATO attacks are and what the most common types look like.
lirantal/is-website-vulnerable
finds publicly known security vulnerabilities in a website's frontend JavaScript libraries - lirantal/is-website-vulnerable
apal21/target-blank-vulnerabilities-features
Examples of some features and the vulnerabilities that can exploit any webpage if target="_blank" is used without rel="noopener" - apal21/target-blank-vulnerabilities-features
Introduction · OWASP Cheat Sheet Series
yeahhub/Hacking-Security-Ebooks
Top 100 Hacking & Security E-Books (Free Download) - yeahhub/Hacking-Security-Ebooks
The CEO Cybersecurity Challenge
The CEO Cybersecurity Challenge (#ceocybersecuritychallenge) is designed to get any organisation to root of their security problems; their people.
Attaques ciblées : le jeu - Protégez vos données. Faites les bons choix.
A tout moment, de nombreux concurrents ou individus mal intentionnés aimeraient mettre la main sur les données de votre entreprise. Etes-vous prêts à faire les bons choix ? Avez-vous évaluer le budget dont vous aurez besoin pour mettre en place une politique de sécurité ? Votre compagnie est-elle parée contre toute cyberattaque éventuelle ?
Have I Been Pwned: Check if your email has been compromised in a data breach
Have I Been Pwned allows you to search across multiple data breaches to see if your email address has been compromised.
The No More Ransom Project
Why Software Remains Insecure
There are myriad theories as to why software remains insecure after we've spend decades trying to solve the problem. Common reasons include: Get the Audio
Np securite web note tech
CSRF in Action 🎭
Demonstration of Cross Site Request Forgery(CSRF) with a simple todo app.
yadox666/The-Hackers-Hardware-Toolkit
The best hacker's gadgets for Red Team pentesters and security researchers. - yadox666/The-Hackers-Hardware-Toolkit