Process Mutex Vulnerability Assessment Tool
-
Updated
Jan 9, 2018 - C++
Process Mutex Vulnerability Assessment Tool
Documentation about the project of a vulnerable web application.
Web Security Audit
This repository contains document reports on the results of an automatic security scan. The task was "Vulnerability scan of Metasploitable2 machine using OpenVAS". The report provide detailed summary on each vulnerability, including its severity, potential impact, and recommended mitigation strategies.
Index-based multi-hazard vulnerability assessment methodology for churches
Rapticore API Connector for findings stats - rapticore.com
Grep vulnerability results
This repository contains all the code and data related to my Bachelor Thesis: Vulnerability Assessment for Rowhammer Attack.
measures the vulnerability of the system by formulating the aggregated metric using extended metrics.
Vigilante Vixen has learned that there were many security vulnerabilities from their technical, behavioral, law, and human resources aspects. Despite us not being directly involved in offshore financial services or the legal profession, technology roles have a considerable amount of opportunity to review this case and implement security regulations
In this AKS-focused workshop, you will work with Azure and Calico Cloud to learn how to design and deploy best practices to achieve compliance with regulatory frameworks such as PCI, SOC2, HIPAA and others and secure your Kubernetes environment.
A series of detailed vulnerability assessments and PoCs on Metasploitable2, aimed at demonstrating a systematic approach to identifying and mitigating security vulnerabilities for educational purposes.
This is a vulnerable login page that is developed in Python's Flask Framework and a backend MySQL server.
First assignment for the "Informatics and Organizational Security" subject. The project consisted in developing a vulnerable platform for a e-health corporation, and then creating a secure version of this platform where the vulnerabilities were fixed.
ShadowStrike is an interactive bash script for educational SSH brute force simulation. User-configurable with error handling, it leverages Hydra to automate attacks. Ideal for controlled security testing and learning about vulnerabilities.
A VAPT Report on Microsoft Windows Server 2008 Enterprise Service Pack 1.........
Davos exposes data about vulnerabilities in both commercial and open-source software product releases (relatedly useful for operators of Pivotal Application Service)
Welcome to my portfolio, where I showcase my expertise as a security researcher.
Learn more about my skills, experience and goals within cybersecurity,
Net::OpenVAS - Perl interface for OpenVAS - Open Vulnerability Assessment Scanner
Add a description, image, and links to the vulnerability-assessment topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-assessment topic, visit your repo's landing page and select "manage topics."