4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

dma-attack-techniques

gmh5225

2.7K

Guide for researching PCIe DMA attacks using FPGA hardware, covering techniques, pcileech, and firmware development for security analysis.

DMA
PCIe
FPGA
4. Security & Compliance

game-hacking-techniques

gmh5225

2.7K

Guide to game hacking techniques including memory manipulation, code injection, and ESP/aimbot development.

Memory Manipulation
Code Injection
ESP
4. Security & Compliance

30-auth-module-architecture

TencentBlueKing

2.5K

Provides architectural guidance for authentication and authorization modules, including IAM integration, RBAC implementation, and OAuth flows for secure access control.

IAM
RBAC
OAuth
4. Security & Compliance

37-ticket-module-architecture

TencentBlueKing

2.5K

Guides secure credential management architecture including encryption, authorization, and access control for password, SSH, and token types.

Credential Management
Encryption
Authorization
4. Security & Compliance

45

TencentBlueKing

2.5K

Manages IAM RBAC permission model changes including resource type definition, permission configuration, migration scripts, and callback implementation.

IAM
RBAC
Permission Migration
4. Security & Compliance

19-jwt-security

TencentBlueKing

2.5K

Provides a guide for implementing JWT security authentication, covering token generation, validation, refresh, permission checks, and OAuth2 integration.

JWT
OAuth2
Token Refresh
4. Security & Compliance

20-audit-logging

TencentBlueKing

2.5K

Provides guidance for implementing audit logging to track user operations, sensitive actions, and fulfill compliance requirements.

Audit Logs
Compliance
User Behavior Tracking
4. Security & Compliance

security-principles

exceptionless

2.4K

Provides security best practices for Exceptionless codebase including secrets management, input validation, and secure defaults to avoid common vulnerabilities.

secrets management
input validation
OWASP
4. Security & Compliance

auditing-pre-release-security

OneKeyHQ

2.2K

Audits security and supply-chain risks by comparing code changes between two Git references for pre-release validation.

Security Audit
Git References
Supply Chain Risk
4. Security & Compliance

pr-review

OneKeyHQ

2.2K

Security-first PR review checklist targeting auth, sensitive data, supply-chain risks, and performance while avoiding UI nitpicks.

Auth
PII
Supply-Chain
4. Security & Compliance

red-team-tactics

vudovn

2.0K

Provides MITRE ATT&CK-based red team tactics covering attack phases, detection evasion, and reporting methodologies.

MITRE ATT&CK
Red Teaming
Detection Evasion
4. Security & Compliance

vulnerability-scanner

vudovn

2.0K

Performs advanced vulnerability analysis using OWASP 2025 standards, including supply chain security assessment and attack surface mapping for risk prioritization.

OWASP 2025
Supply Chain Security
Attack Surface Mapping
4. Security & Compliance

jar-audit-agent

jar-analyzer

1.9K

Provides evidence-driven Java security audits, converting conclusions into reproducible evidence and measurable coverage metrics.

Java
Security Audit
JAR
4. Security & Compliance

fuzzing-dictionary

trailofbits

1.7K

Provides domain-specific token dictionaries to enhance security testing via fuzzing of parsers, protocols, and format-specific code.

Fuzzing
Security Testing
Token Dictionaries
4. Security & Compliance

algorand-vulnerability-scanner

trailofbits

1.7K

Scans Algorand smart contracts for security vulnerabilities including rekeying attacks and access control issues, aiding in project audits.

Algorand
TEAL
Smart Contracts
4. Security & Compliance

token-integration-analyzer

trailofbits

1.7K

Analyzes ERC20/ERC721 token implementations for security compliance, checks for vulnerabilities, and assesses contract composition and owner privileges.

ERC20
ERC721
Smart Contract Audit
4. Security & Compliance

semgrep-rule-creator

trailofbits

1.7K

Creates custom Semgrep rules to detect security vulnerabilities and bug patterns in code for enhanced code auditing and security analysis.

Semgrep
Security Vulnerabilities
Static Analysis
4. Security & Compliance

address-sanitizer

trailofbits

1.7K

Detects memory errors such as buffer overflows and use-after-free in C/C++ code during fuzzing to enhance security.

AddressSanitizer
Fuzzing
MemoryErrors
4. Security & Compliance

solana-vulnerability-scanner

trailofbits

1.7K

Scans Solana/Anchor programs for critical security vulnerabilities including arbitrary CPI and improper PDA validation during smart contract audits.

Solana
CPI
PDA
4. Security & Compliance

wycheproof

trailofbits

1.7K

Provides test vectors to validate cryptographic implementations against known attacks and edge cases.

Test Vectors
Cryptographic Security
4. Security & Compliance

harness-writing

trailofbits

1.7K

Provides techniques for crafting effective fuzzing harnesses to test software security across multiple programming languages.

Fuzzing
Harness
4. Security & Compliance

libfuzzer

trailofbits

1.7K

Coverage-guided fuzzing tool integrated with LLVM to automatically detect security vulnerabilities in C/C++ code via random input testing.

libfuzzer
LLVM
C++
4. Security & Compliance

aflpp

trailofbits

1.7K

AFL++ enhances security testing with multi-core fuzzing capabilities for C/C++ applications to uncover vulnerabilities.

AFL++
Fuzzing
C/C++
4. Security & Compliance

ton-vulnerability-scanner

trailofbits

1.7K

Scans TON smart contracts for critical security vulnerabilities in FunC code.

TON
Smart Contracts
FunC
4. Security & Compliance
PreviousPage 5 of 151 PageNext