A web app that makes it easier to test data loss prevention software.
-
Updated
Apr 28, 2015 - HTML
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
A web app that makes it easier to test data loss prevention software.
InfoSec Training, Community, and Competition
A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a large application, with an emphasis on identifying development anti-patterns and footguns.
Collection of Educational and Work Projects
A small Java project for encrypting, managing and decrypting files and other data
Charleston InfoSec Group Website
Versioned public Helix API in various languages/platforms, along with documentation and example use-cases
Web Application to perform image encryption using hybrid algorithms built on ECC and AES
Various Cipher techniques to choose from and encrypt/decrypt the message.
Hope we can use this to learn how to effectively contribute to open source with all its facets using this free resource . Its important we support this project as I will partly donate to the main freeCodeCamp project .If you want to contribute to the main project go to: https://contribute.freecodecamp.org/#/ and if you want to learn to code for…
QuickTrack helps you to monitor your IP addresses by detecting various ports and services as well as identifying potential vulnerabilities.
The website for Lakshya CTF's weekly challenge portal.
This site covers a variety of topics ranging from full-on development projects to short pieces of code.
This repository hosts the code of a software framework for eliciting security requirements in agile specifications. Natural Language Processing was used to address this challenge. The framework was one of the outputs of my M.Sc
YYT6801‘s Test-examples and Notes of full stack development
Cybersecurity training, testing and recruitment platform
An information security themed blog
Automate the creation of an Identity and Access Management lab environment.
Created by The cybersecurity community