A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
-
Updated
Apr 9, 2024 - Dockerfile
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
π Overview π Tooling π Process π Physical π People π
π VPS π Network π Cloud π Web Applications π
My Blockchain auditing service
Reviews and tests of security products
π IoT π Mobile π
This example generates a random secret key and ordinal value, creates a Pedersen commitment using secp256k1, generates a Bulletproof using secp256k1_bulletproofs, encodes the data as a hex string, adds it as an output to a Bitcoin transaction, and broadcasts it to the network. Note that this is a simplified example and should not be used without ad
security audits by Tenset Security
Drupal 8 port of the Security Review module for GSoC 2015
Add a description, image, and links to the security-review topic page so that developers can more easily learn about it.
To associate your repository with the security-review topic, visit your repo's landing page and select "manage topics."