Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

infosecsimplified

Here are 45 public repositories matching this topic...

two-factor-authentication-sim-swapping

An adversary may utilize a sim swapping attack for defeating 2fa authentication

  • UpdatedJan 29, 2024
two-factor-authentication-sim-cloning

An adversary may utilize a sim swapping attack for defeating 2fa authentication

  • UpdatedJan 29, 2024
cyber-kill-chain

Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks

  • UpdatedJan 29, 2024
threat-intelligence

Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, and future cyber threats (Collecting information about a potential threat, then analyzing that information to learn more about the negative events)

  • UpdatedFeb 18, 2024
incident-response

Incident response is a set of steps that are used to handle the aftermath of a data breach or cyberattack

  • UpdatedJan 29, 2024
digital-forensics

Digital Forensics is the process of finding and analyzing electronic data

  • UpdatedJan 29, 2024
stored-cross-site-scripting

An adversary may inject malicious content into a vulnerable target

  • UpdatedJul 9, 2025
cybersecurity

Cybersecurity is the measures taken to protect networks, devices, and data against cyberattacks

  • UpdatedJan 29, 2024
directory-listing

A threat actor may list files on a misconfigured server

  • UpdatedJan 29, 2024
two-factor-authentication-brute-force

A threat actor may lunch brute force to the two-factor authentication (2FA) logic causing unauthorized access to the target

  • UpdatedJan 29, 2024
reflected-cross-site-scripting

A threat actor may inject malicious content into webapp. The payload is reflected in the HTTP request and response, then executed in the victim's browser

  • UpdatedJul 9, 2025
vertical-privilege-escalation

A threat actor may perform unauthorized functions belonging to another user with a higher privileges level

  • UpdatedJan 29, 2024
data-compliance

Data compliance is the process of following various regulations and standards to ensure that sensitive digital assets (data) are guarded against loss, theft, and misuse

  • UpdatedJan 29, 2024
client-side-template-injection

A threat actor may trick a victim into executing native template syntax on a vulnerable target

  • UpdatedJan 29, 2024
dom-based-cross-site-scripting

A threat actor may inject malicious content into webapp. The payload is not reflected in the HTTP request and response, then executed in the victim's browser

  • UpdatedJul 9, 2025
open-redirect

A threat actor may send a malicious redirect request for a vulnerable target to a victim; the victim gets redirected to a malicious website that threat actor controls

  • UpdatedJul 9, 2025
risk-management

Risk management is the process of identifying, assessing, treating, and monitoring any negative events that affect a company's ability to operate (Preventing them or minimizing their harmful impact)

  • UpdatedJan 29, 2024
xxe-injection

A threat actor may interfere with an application's processing of extensible markup language (XML) data to view the content of a target's files

  • UpdatedJan 29, 2024
captcha-bypass

A threat actor may bypass the Completely Automated Public Turing test to tell Computers and Humans Apart (captcha) by breaking the solving logic, human-assisted solving services, or utilizing automated technology

  • UpdatedJan 29, 2024
authentication-bypass

A threat actor may gain access to data and functionalities by bypassing the target authentication mechanism

  • UpdatedJan 29, 2024

Improve this page

Add a description, image, and links to theinfosecsimplified topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with theinfosecsimplified topic, visit your repo's landing page and select "manage topics."

Learn more


[8]ページ先頭

©2009-2025 Movatter.jp