4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

anti-reversing-techniques

rmyndharis

68

Analyzes and bypasses anti-reversing techniques, obfuscation, and anti-debugging mechanisms for authorized security analysis of protected binaries.

Obfuscation
Anti-Debugging
Binary Analysis
4. Security & Compliance

reverse-engineer

rmyndharis

68

Expert reverse engineer for binary analysis, disassembly, and vulnerability research using industry tools to analyze executables and uncover security flaws.

Binary Analysis
IDA Pro
Vulnerability Research
4. Security & Compliance

mtls-configuration

rmyndharis

68

Configures mutual TLS (mTLS) for zero-trust service-to-service communication, ensuring certificate-based authentication and encryption.

mTLS
Zero-trust
Certificate Management
4. Security & Compliance

frontend-mobile-security-xss-scan

rmyndharis

68

Analyzes React, Vue, Angular, and vanilla JS code for XSS vulnerabilities and provides prevention strategies.

XSS
Frontend Security
Code Auditing
4. Security & Compliance

screen-reader-testing

rmyndharis

68

Tests web applications for screen reader compatibility (VoiceOver, NVDA, JAWS) to ensure accessibility compliance.

Accessibility Testing
Screen Readers
WCAG
4. Security & Compliance

accessibility-testing

conorluddy

68

Validates iOS app accessibility against WCAG 2.1 standards through automated testing, VoiceOver compatibility checks, and semantic analysis.

WCAG 2.1
iOS
VoiceOver
4. Security & Compliance

security-audit

mswell

67

Conducts comprehensive security code audits using STRIDE threat modeling, code review, and vulnerability assessment to identify exploitable security bugs for bug bounty contexts.

STRIDE
Code Audit
Vulnerability Assessment
4. Security & Compliance

mobile-security-expert

s7safe

66

Provides a knowledge base of mobile security vulnerabilities from HackerOne reports, detailing Android and iOS app exploitation techniques for security researchers and auditors.

Mobile Security
Vulnerability Mining
HackerOne
4. Security & Compliance

security

htlin222

66

Conducts security audits, vulnerability detection, and secure coding reviews to ensure OWASP compliance.

Security Audits
Vulnerability Detection
OWASP
4. Security & Compliance

aws-sdk-java-v2-kms

giuseppe-trisciuoglio

62

Enables secure key management, encryption, decryption, and digital signing operations for Java 2.x applications using AWS KMS.

AWS KMS
Java 2.x
Encryption
4. Security & Compliance

unit-test-security-authorization

giuseppe-trisciuoglio

62

Provides unit tests for Spring Security annotations to validate role-based access control and authorization policies.

Spring Security
Role-Based Access Control
4. Security & Compliance

spring-boot-security-jwt

giuseppe-trisciuoglio

62

Provides JWT authentication and RBAC authorization patterns for Spring Boot 3.5.x using Spring Security 6.x and JJWT.

Spring Boot
JWT
Spring Security
4. Security & Compliance

aws-sdk-java-v2-secrets-manager

giuseppe-trisciuoglio

62

Integrates AWS Secrets Manager with Java applications for secure secret storage, rotation, and credential management.

AWS Secrets Manager
Java SDK
Spring Boot
4. Security & Compliance

auth-expert

cin12211

61

Expert in implementing secure authentication systems using JWT, OAuth 2.0, and RBAC for user access management and security enforcement.

JWT
OAuth 2.0
RBAC
4. Security & Compliance

accessibility-expert

cin12211

61

Ensures web accessibility compliance with WCAG 2.1/2.2 through ARIA implementation, keyboard navigation, and screen reader testing.

WCAG 2.1
WAI-ARIA
Screen Reader
4. Security & Compliance

secure-code-guardian

Jeffallan

61

Enforces security best practices for authentication, input validation, and OWASP Top 10 vulnerability prevention in code.

OWASP Top 10
Input Validation
Authentication
4. Security & Compliance

security-reviewer

Jeffallan

61

Conducts security audits, code vulnerability reviews, and infrastructure security assessments using SAST, penetration testing, and DevSecOps practices.

SAST
Penetration Testing
DevSecOps
4. Security & Compliance

database-schema-validator

rominirani

61

Validates SQL database schema files against internal safety and naming policies to ensure compliance.

SQL
Schema Validation
Compliance
4. Security & Compliance

bmad-security-review

bacoco

61

Conducts structured security reviews to harden software designs and implementations against vulnerabilities.

Security Review
Code Auditing
4. Security & Compliance

php-security-patterns

TheBushidoCollective

60

Provides essential PHP security patterns including input validation, SQL injection prevention, XSS protection, and CSRF tokens for secure application development.

SQL Injection
XSS
CSRF
4. Security & Compliance

sip-authentication-security

TheBushidoCollective

60

Enables implementation of authentication, encryption, and security mechanisms for SIP servers, clients, and proxies.

SIP
Authentication
Encryption
4. Security & Compliance

kubernetes-security

TheBushidoCollective

60

Enables implementation of Kubernetes security best practices including RBAC, Pod Security Policies, and Network Policies for secure cluster management.

Kubernetes
RBAC
Pod Security Policies
4. Security & Compliance

fnox-security-best-practices

TheBushidoCollective

60

Provides secure secrets management best practices including encryption, key management, and access control implementation with Fnox.

Secrets Management
Key Management
Fnox
4. Security & Compliance

fnox-providers

TheBushidoCollective

60

Configures Fnox providers for secure encryption and secret storage, supporting age encryption, cloud services (AWS, Azure, GCP), and password managers.

age
AWS
Secret Storage
4. Security & Compliance
PreviousPage 36 of 151 PageNext