To easily check Python dependency conflicts/security vulnerabilities.
-
Updated
May 22, 2023 - Python
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
To easily check Python dependency conflicts/security vulnerabilities.
Israel X - Unlocking Information Security I: From Cryptography to Buffer Overflows and Unlocking Information Security II: An Internet Perspective
This project is a DDOS Attack protection tool built with Python.
Python projects focused on security practices and implementations for enhancing and understanding cybersecurity through code.
A random PIN/Password/Passphrase generator
The Armory is a comprehensive suite of tools for network security and penetration testing, designed for use by security professionals and researchers.
A tutorial exploring various security frameworks for FastApi
Password Generator: A handy tool to create strong and secure passwords effortlessly.
Python script to analyse IBM Cloud access management configuration
Cross-Platform Full System Hardware and Configurations Profiler
Https to Http Mocking Server in Python. Written to handle Self Signed Server Cerifictae issues in Selenium. Can also be used for all other purposes like penetration testing (wink)
Possum - Privileged Upstart Service for System manipulation
Oct 29 - 30, 2024 • San Francisco, CA
Find, fix (and prevent!) known vulnerabilities in your code
Automatic, daily repo and metadata backup - no maintenance needed: fast restore, DR, AWS, and S3 cloud storage support
Detect open source vulnerabilities in real time with suggested fixes for quick remediation
Automatic daily backups of your GitHub repos and metadata with on-demand restores to protect your business
Code scanning at ludicrous speed. Find bugs and reachable dependency vulnerabilities. Enforce standards on every commit
We help developers write clean code
GuardRails provides continuous security feedback for modern development teams
Protect your app from malicious open source dependencies
Runtime Code Review
Keep dependencies up-to-date with automated Pull Requests
Backup repositories, metadata and LFS into AWS, Azure, OneDrive, GCP, etc. Pay per repositories, not seats. SOC2 in progress