Layer for static code analysis and security hardening
-
Updated
Jan 14, 2026 - BitBake
Layer for static code analysis and security hardening
FAANG (MANGA) Security Engineer Interview Collection. An ongoing & curated collection of awesome software, frameworks and libraries, learning tutorials and videos, technical guidelines and best practices, and cheatsheets in the world of Security Engineering Career.
This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding a…
A multi-layered prompt injection detection system built with Laravel.
Threat-oriented defensive frameworks reorganizing PCI DSS v4.0.1 requirements by attack type rather than compliance checklist. Educational guide for security professionals implementing strategic layered defense.
Educational PoC demonstrating network isolation for Node.js apps using Docker internal networks and nginx as an egress proxy gateway.
Breach probability simulator for CISOs. Quantifies defense-in-depth effectiveness using Poisson modeling. SOC aesthetic, risk quantification dashboard.
A security runtime that sits inside AI agents to block unauthorized actions, enforce accountability, and prevent misuse in real time
Multi Edit Wiki
Post-quantum cryptography with operational security built in, not bolted on. Constant-time operations, dual-context errors, STRIDE coverage.
A DDoS-resilient, two-tier architecture for web applications in the AWS cloud.
identification, exploitation, and remediation of OWASP API Top 10 vulnerabilities
Zero-Trust access for self-hosted cloud behind Cloudflare: proxied DNS, edge mTLS (client cert + serial allowlist), Cloudflare Access (OTP), egress-only Tunnel → Nginx, Docker-segmented cloud. Deny-by-default, least-privilege, with clear tests and rollback.
Focused on solving common security vulnerabilities (e.g. Numeric/Buffer Over/Under flows and SQL Injection) found in software and writing secure code to mitigate risks to software and data.
Zero Trust Networking with VPC Security + AWS WAF – AWS CSS (SCS-C02) Domain 3 Lab
🛡️ Enforce enterprise-grade security for autonomous AI agents with MAAIS-Runtime, ensuring real-time protection for your agentic AI systems.
Host hardening + protocol operations security framework with prioritized action maps
Add a description, image, and links to the defense-in-depth topic page so that developers can more easily learn about it.
To associate your repository with the defense-in-depth topic, visit your repo's landing page and select "manage topics."