4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

mapbox-token-security

mapbox

37

Provides security best practices for Mapbox access tokens, including scope management, URL restrictions, and rotation strategies.

Mapbox
Access Tokens
Scope Management
4. Security & Compliance

pact-security-patterns

ProfSynapse

36

Provides security best practices and threat mitigation patterns for PACT framework development, covering authentication, data protection, and vulnerability review.

OWASP
Authentication
Data Protection
4. Security & Compliance

standard-security-auth

salavender

36

Specializes in implementing secure authentication mechanisms including JWT, cookie-based sessions, and MFA for web applications.

JWT
MFA
Cookie Auth
4. Security & Compliance

dependabot-security

bitsoex

34

Automates resolution of Dependabot security alerts in Java/Gradle projects through severity-based processing and CI validation.

Dependabot
Java
Gradle
4. Security & Compliance

security-review

bitsoex

34

Conducts security analysis on code changes, covering credential scanning, input validation, authentication checks, and dependency vulnerability assessment.

Credential Scanning
Input Validation
Dependency Scanning
4. Security & Compliance

plaid-identity-expert

raintree-technology

34

Provides identity verification, KYC compliance, and fraud prevention services for account holder information retrieval including name and address.

Plaid Identity
KYC
Identity Verification
4. Security & Compliance

api-security

jefflester

34

Enforces API security best practices to prevent OWASP Top 10 vulnerabilities including SQL injection and XSS.

OWASP
SQL Injection
XSS
4. Security & Compliance

ffuf-web-fuzzing

danielmiessler

34

Guides on using ffuf for web fuzzing in penetration testing, covering authenticated scans, auto-calibration, and result analysis.

ffuf
authenticated fuzzing
penetration testing
4. Security & Compliance

fix-code-vulnerability

letta-ai

33

Guides developers in identifying and patching security vulnerabilities, including CWE-classified flaws and injection issues, to enhance code security.

CWE
Injection
Code Auditing
4. Security & Compliance

openssl-selfsigned-cert

letta-ai

33

Generates self-signed SSL/TLS certificates using OpenSSL, including private keys, CSRs, and PEM files, with verification and common pitfalls.

OpenSSL
SSL/TLS
Self-signed
4. Security & Compliance

filter-js-from-html

letta-ai

33

Removes JavaScript and XSS payloads from HTML while preserving original document structure for secure content handling.

XSS
HTML Sanitization
Security Filter
4. Security & Compliance

git-leak-recovery

letta-ai

33

Guides recovery and secure removal of sensitive data from Git history after reset or rebase operations to prevent leaks.

Git
Secrets
Reflog
4. Security & Compliance

vulnerable-secret

letta-ai

33

Guides extraction of secrets from protected binaries using static and dynamic analysis for security assessment and vulnerability discovery.

Reverse Engineering
Static Analysis
Dynamic Analysis
4. Security & Compliance

sanitize-git-repo

letta-ai

33

Removes sensitive credentials and secrets from Git repositories to prevent exposure and ensure security compliance.

Git
Secrets Management
Security Audit
4. Security & Compliance

git-leak-recovery

letta-ai

33

Recover and securely remove leaked secrets from Git repositories, including orphaned commits and unreachable objects, to prevent security breaches.

Git
Secrets
History Rewriting
4. Security & Compliance

feal-linear-cryptanalysis

letta-ai

33

Guides linear cryptanalysis for FEAL cipher, enabling key recovery from known plaintext-ciphertext pairs via mathematical analysis.

FEAL
Linear Cryptanalysis
Key Recovery
4. Security & Compliance

fix-code-vulnerability

letta-ai

33

Provides guidance for identifying and fixing security vulnerabilities in code, including CVE/CWE remediation and common attack types like SQL injection and XSS.

CVE
CWE
XSS
4. Security & Compliance

crack-7z-hash

letta-ai

33

Guides cracking 7z archive password hashes using dictionary or brute-force methods for security testing and password recovery.

7z
Password Cracking
Brute-Force
4. Security & Compliance

feal-differential-cryptanalysis

letta-ai

33

Guides implementation of differential cryptanalysis on FEAL and Feistel ciphers for key recovery and vulnerability exploitation in security challenges and CTF exercises.

FEAL
Differential Cryptanalysis
Feistel Network
4. Security & Compliance

feal-differential-cryptanalysis

letta-ai

33

Guides implementation of differential cryptanalysis on FEAL and Feistel ciphers, emphasizing valid characteristic construction for key recovery.

FEAL
Differential Cryptanalysis
Feistel Cipher
4. Security & Compliance

feal-linear-cryptanalysis

letta-ai

33

Guides linear cryptanalysis for FEAL and Feistel ciphers, enabling key recovery from known plaintext-ciphertext pairs.

FEAL
Linear Cryptanalysis
Feistel Cipher
4. Security & Compliance

crack-7z-hash

letta-ai

33

Guides cracking 7z archive password hashes for security testing, CTF challenges, and authorized password recovery scenarios.

7z
Password Cracking
Hash Cracking
4. Security & Compliance

password-recovery

letta-ai

33

Guides recovery of passwords and sensitive data from disk images, corrupted files, and forensic scenarios.

Disk Forensics
Password Recovery
Credential Extraction
4. Security & Compliance

filter-js-from-html

letta-ai

33

Removes JavaScript from HTML to prevent XSS attacks while preserving structure, essential for secure content sanitization.

XSS
HTML Sanitization
Script Tags
4. Security & Compliance
PreviousPage 40 of 151 PageNext