recentpopularlog in

loket : security   50

Fix and prevent known vulnerabilities in Node.js, Ruby, Java and Python apps | Snyk
Fix known vulnerabilities in your Node.js, Ruby, Python, Scala and Java apps: apply upgrades and security patches, prevent adding vulnerable dependencies, and get alerted about new security issues.
security  build  dependency  java  javascript  ruby  scala  python 
october 2017 by loket
Home - Arachni - Web Application Security Scanner Framework
Arachni is a Free/Public-Source Web Application Security Scanner aimed towards helping users evaluate the security of web applications.
framework  security  scanner  vulnerability  pentesting 
october 2017 by loket
Website security - keep in check with Acunetix
Audit your website security with Acunetix and check for and manage XSS, SQL Injection and other web vulnerabilities. Create reports for management & dev ops
security  vulnerability  scanner  network 
october 2017 by loket
Retire.js
Retire.js : What you require you must also retire
javascript  security  check  plugin  build  dependency 
october 2017 by loket
Google Hacking Database, GHDB, Google Dorks
Google Hacking Database (GHDB) By Offensive Security
security  hacking  exploit  google  reference 
october 2017 by loket
Exploits Database by Offensive Security
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
security  exploit  reference 
october 2017 by loket
CVE - Common Vulnerabilities and Exposures (CVE)
Common Vulnerabilities and Exposures (CVE®) is a dictionary of common names (i.e., CVE Identifiers) for publicly known cyber security vulnerabilities. Assigned by CVE Numbering Authorities from around the world, use of CVE Identifiers ensures confidence among parties when used to discuss or share information about a unique software vulnerability, provides a baseline for tool evaluation, and enables data exchange for cyber security automation.
exploit  security  vulnerability  list 
october 2017 by loket
BlueBorne Information from the Research Team - Armis Labs
BlueBorne is an attack vector by which hackers can leverage Bluetooth connections to penetrate and take complete control over targeted devices.
bluetooth  security  hack  exploit 
september 2017 by loket
HackerOne: Vulnerability Coordination and Bug Bounty Platform
HackerOne provides a platform designed to streamline vulnerability coordination and bug bounty program by enlisting hackers to improve your security.
security  hacking  vulnerability  collaboration  community  bug  bug-bounty 
may 2016 by loket
Let's Encrypt - Free SSL/TLS Certificates
Let’s Encrypt is a free, automated, and open certificate authority brought to you by the Internet Security Research Group (ISRG). ISRG is a California public benefit corporation, and is recognized by the IRS as a tax-exempt organization under Section 501(c)(3) of the Internal Revenue Code.
encryption  free  security  ssl  https  certificate 
january 2016 by loket
Homepage | Silent Circle
To build a truly private product, you have to build a truly private company.
encryption  privacy  security  phone  mobile 
september 2015 by loket

Copy this bookmark:





to read