Cover image for Accelerated Security & QA Excellence
0
4
Cover image for Adopting open-source SAML SP framework for specific needs
0
3
Cover image for Yandex, Junior python developer
0
10
Cover image for Cyber Security Case Study
0
9
Cover image for Protect & Share data using your typing pattern
0
29
Cover image for Ciphora Messaging Desktop App
0
2
Cover image for Pentest Engagements
0
5
Cover image for Bazaar
0
4
Cover image for cancelVouch doesn't update the voucher index of the last vouch …
0
12
Cover image for Implementation of Information Security Management System (ISMS)
0
2
Cover image for Blind Vulnerability: Out-of-Band Techniques (Research)
0
0
Cover image for Control Environment Narrative
0
20
Cover image for Penetration Testing / Vulnerability Assessment
0
21
Cover image for Enhancing Web Application Security
0
14
Cover image for Optimized Incident Response and IAM Systems
0
2
Cover image for Dockerized Squid Proxy
0
0
Cover image for Enhancing Cloud Security for a Multinational Corporation
0
5
Cover image for Automated Vulnerability Scanning and Security Assessment
1
0
Cover image for Penetration Testing Expert
0
4
Cover image for Automated Cybersecurity Report
Aggregator and Notifier
0
0
Cover image for Google Bug Bounty Program
0
4
Cover image for Audit Report: Viku Project
0
1
Cover image for CI/CD Pipeline
0
0
Cover image for Vulnerability Report
0
1
Cover image for Detailed Vulnerability Assessment for a Financial Institution
0
10
Cover image for UserManager.updateFrozenInfo cannot be called from UToken
0
5
Cover image for Terraform Provider for Bonsai.io
0
9
Cover image for Fintech SOC Implementation
0
5
Cover image for Vulnerability assessment
0
64
Cover image for Wordpress Website Malware Removal
0
7
Cover image for Data Exfiltration via Formula Injection
0
0
Cover image for Developing a Vulnerability Management Dashboard
0
1
Cover image for Expedia/VRBO
0
0
Cover image for Clean Malware from Wikye.com
0
38
Cover image for crashlattice57/ML_Malicous_URL_Classification
0
3
Cover image for Developing a Custom Fully-Featured P2P Blockchain Network
0
5
Cover image for Scheduled Security and Audit Procedures
0
17
Cover image for Cloudflare bypass test for security testing or scraping
0
13
Cover image for DevSecOps as a Service
0
9
Cover image for Healthcare Cybersecurity Enhancement Initiative
1
5
Cover image for Performance Test Engineer
0
2
Cover image for A Provably Fair Ethereum Crash Game
0
75
Cover image for Funders can deny rewards to last claimants by calling refundDep…
0
18
Cover image for SQLFluff SQL Linter Project
0
0
Cover image for Launch Legends Token Launch Platform
0
7
Cover image for Penetration Testing for a Global E-commerce Platform
0
1
Cover image for Azure Pipeline
0
0
Cover image for Penetration Test for Web3 Gaming Project
0
4
Cover image for Offensive Security Engineer
0
1
Cover image for Security Testing for iOS and Android Mobile Applications
1
0
Cover image for Purple Team Assessment & Detection Enhancement
0
0
Cover image for Penetration Testing Web Apps of Mach7t 🛠️
0
93
Cover image for Network Reconnaissance Tool
0
1
Cover image for Audit Report: BlindDoge Project
0
0
Cover image for SOP
0
1
Cover image for SOC as a Service (Security Operations Center)
0
2
Cover image for Axoire | Online Crypto Wallet & Payment System
0
5
Cover image for CX Insights Research Tool
0
5
Cover image for refundDeposit function can be DoS by an unbounded loop in getLo…
0
3
Cover image for Fluxion microMDM
0
3
Cover image for Building a Security Operations Center with Open-Source Tools
0
4
Cover image for Event-Driven Security
0
21
Cover image for Penetration Testing / Vulnerability Assessment
0
18
Cover image for Security Engineering as a Service
0
24
Cover image for Firewall Security Enhancement and Threat Detection
0
3
Cover image for Network Security Appliance Management
0
1
Cover image for Reconic | All-in-One Reconnaissance Tool
0
9
Cover image for I will do a vulnerability testing and pen test for your website
0
2
Cover image for Postmaster - Largest Nonprofit Email Service Provider
0
2
Cover image for Design and Implement Centralized Secret Management System
0
0
Cover image for Phishing Simulation & Endpoint Hardening Evaluation
0
0
Cover image for Helpdesk-as-a-Service(HDaaS)
0
7
Cover image for Bug bounty experience
0
40
Cover image for Reverse Engineering, Burp Suite & Wireshark (Algo Trading Bot)
0
2
Cover image for Go API Client for Bonsai.io
0
9
Cover image for The auction can be started by anyone calling settle before star…
0
3
Cover image for Security Hardening for Healthcare Systems
1
6
Cover image for Incident Response Tabletop
0
2
Cover image for Backup Automation
0
1
Cover image for Audit Report: BEING Project
0
1
Cover image for vCISO Advisory Services for Various Startups
0
5
Cover image for Automated Ransomware Group Activity
Tracker and Alert System
0
3
Cover image for Zaproxy Development | World's Most Famous Web Security Tool 😇
0
4
Cover image for Firewall Configuration & Rule Review
1
1
Cover image for Penetration Tester
0
4
Cover image for Comprehensive Security Testing and Quality Assurance
0
3
Cover image for Onboarding and Access Policy Template
0
25
Cover image for Burp Suite Certified Practitioner (BSCP)
0
7
Cover image for IT Engineer as a Service
0
11
Cover image for Log Analysis & Threat Detection Enhancement
0
7
Cover image for Application Security Assessment & Exploitation Review
0
0
Cover image for Information Security Compliance Services
0
1
Cover image for A malicious early user/attacker can manipulate the pxGmx's pric…
0
24
Cover image for CrypticTunnel - Cryptographic Secured Transfer Tunnel
0
1
Cover image for Simplifying VPC Peering with Terraform
0
6
Cover image for Building a PCI DSS-Compliant Secure AWS Infrastructure
0
0
Cover image for 
Stock Broker Application
0
9
Cover image for AA Israel
0
3
Cover image for security services
0
1
Cover image for Vulnerability Management and Risk Reduction Program
0
4