ssh-audit by jtesta
Community project for developing common guidelines and best practices for secure configurations.
Diverse information and answers for all your miscellaneous questions and needs.
Community project for developing common guidelines and best practices for secure configurations.
A library for validating and accessing environment variables in Node.js programs
Node package for preparing CTF events with OWASP Juice Shop challenges for popular CTF frameworks.
A tool for SSH server auditing with comprehensive analysis capabilities.
Kubernetes security platform with industry standard open source utilities for securing Kubernetes clusters and apps.
A collection of binary tools for various purposes including linking, assembling, profiling, and more.
A command-line tool for parsing, creating, and manipulating JWT tokens
Porting GNU/Linux userland tools to the bionic/Linux userland of Android to provide access to the audit stream for Android applications with minimal overhead.
Community project for developing common guidelines and best practices for secure configurations.
A tool to secure your shell commands history by clearing sensitive commands
A visualization tool for uploading and visualizing data as graphs on-the-fly, based on AfterGlow and running on Django.
Top 15 recommendations to protect your business from email-borne threats with Security Gateway.
A set of instructions for the Dalvik virtual machine to manipulate registers and values in Android applications.
A comprehensive collection of resources for learning ARM assembly language and shellcode development.
A scalable python framework for security research and development teams.
Cybersecurity conference featuring talks on various hacking topics by industry experts.
A project with Terraform and Ansible scripts to create an orchestrated BlueTeam Lab for testing attacks and forensic artifacts on Windows environment.
Online cybersecurity conference with speakers' talks and interactive Q&A sessions.
Guardey delivers enterprise-grade cybersecurity solutions tailored for small and medium-sized businesses, ensuring robust protection for your workforce across all operational environments – office, home, or remote. Our platform leverages advanced VPN technology to create an encrypted tunnel for your internet traffic, guaranteeing privacy and anonymity. Simultaneously, our intelligent cyber alarm continuously analyzes network activity, adapting every 15 minutes to detect and neutralize emerging threats.