Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
One-step iOS binary runtime instrumentation for the lazy ones
Tool Analysis Result Sheet
(deprecated) Android application vulnerability analysis and Android pentest tool
Parse and Process AWS IAM Policies, Statements, ARNs, and wildcards.
Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
An Intrusion Detection System library loosely based on PHP IDS
Automated cacert.pem management for PHP projects
Clear all your logs in [linux/windows] servers 🛡️
Confluent Platform Demo including Apache Kafka, ksqlDB, Control Center, Schema Registry, Security, Schema Linking, and Cluster Linking