A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
-
Updated
Apr 9, 2024 - Dockerfile
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
📚 Overview 🔒 Tooling 🔒 Process 🔒 Physical 🔒 People 📚
📚 VPS 🔒 Network 🔒 Cloud 🔒 Web Applications 📚
My Blockchain auditing service
Reviews and tests of security products
📚 IoT 🔒 Mobile 📚
This example generates a random secret key and ordinal value, creates a Pedersen commitment using secp256k1, generates a Bulletproof using secp256k1_bulletproofs, encodes the data as a hex string, adds it as an output to a Bitcoin transaction, and broadcasts it to the network. Note that this is a simplified example and should not be used without ad
security audits by Tenset Security
Drupal 8 port of the Security Review module for GSoC 2015
Add a description, image, and links to the security-review topic page so that developers can more easily learn about it.
To associate your repository with the security-review topic, visit your repo's landing page and select "manage topics."