capacitor-device-authenticity
Check the authenticity of an Ionic Capacitor app
Check the authenticity of an Ionic Capacitor app
NodeJS script checking whether any of the passwords used online are compromised.
A simple Node.js module that checks against the https://haveibeenpwned.com database through its https://api.pwnedpasswords.com API.
snyk library and cli utility
A classe `ChaoticMap` é uma implementação em TypeScript de um utilitário de criptografia baseada em mapa caótico e AES (Advanced Encryption Standard). Ela permite criptografar e descriptografar dados usando o algoritmo AES-256-CBC com base em uma chave ca
Safety checks for new Ethereum tokens
An AWS CDK custom construct for deploying Prowler to your AWS Account. Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains all CIS
This module generates a CAPTCHA image code. It is designed to be simple to use while providing the flexibility to adjust the CAPTCHA length and ensuring that the text is appropriately sized and centered within the image.
Ce module génère un code CAPTCHA sous forme d'image.
CipherJS is a comprehensive cryptographic library for Node.js, providing functionalities such as hashing, encryption, decryption, JWT creation and validation, and RSA key pair generation.
Easily set your code signing identity
Ensure secure and effective form submission with this comprehensive form validation library. Simplifying the validation process for common fields like passwords, emails and text areas.
Cognito Proxy
A powerful CLI tool that encrypts and decrypts .env files to protect your sensitive information during git commits. CommitSafe ensures that secrets remain secure and reduces the risk of accidental exposure in your repositories.
AWS, Azure, GCP, Oracle, GitHub security scanning scripts
A CLI tool for analyzing code using AI.
A Node.js implementation of OSCORE (Object Security for Constrained RESTful Environments) protocol, providing end-to-end security for IoT applications and other constrained environments using CBOR Object Signing and Encryption.
A CLI tool using that CircleCI API to audit potentially exposed secrets
Safe replacement for the v-html directive
Implementation of Cogny2 Module Sets