Device Bound Session Credentials: A Protocol for Protecting From Cookie Theft
☆440Feb 17, 2026Updated last month
Alternatives and similar repositories for webappsec-dbsc
Users that are interested in webappsec-dbsc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- info on IAM conferences in northern Europe☆25Mar 20, 2026Updated 3 weeks ago
- An open-source Go OpenID Shared Signals Framework Receiver.☆18Mar 24, 2026Updated 3 weeks ago
- ☆14Jul 26, 2021Updated 4 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 8 months ago
- An explainer to propose how the WebCrypto API can be extended to support Hardware Backed keys☆20Jun 6, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆14Updated this week
- Scan GitHub Actions Workflow logs for IOCs☆17Updated this week
- ☆14Feb 26, 2026Updated last month
- How To FIDO☆53Oct 20, 2022Updated 3 years ago
- ☆13May 30, 2025Updated 10 months ago
- Test AMSI Provider implementation in C#☆45Dec 18, 2024Updated last year
- Home for explainer documents originated by the Microsoft Identity Standards team☆18Mar 14, 2024Updated 2 years ago
- ☆74May 20, 2024Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆129Updated this week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CS2 cheat code library.☆23Aug 6, 2025Updated 8 months ago
- Asynchronous delegated key generation without shared secrets (DRAFT)☆71Nov 24, 2023Updated 2 years ago
- Python Scenario-Based OpenID Connect Testing Tool☆38Dec 8, 2023Updated 2 years ago
- Relay for Native Client SSH, see http://goo.gl/HMsm8p☆14Apr 16, 2020Updated 5 years ago
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- Proposals for the Anti-Fraud Community Group.☆27Oct 28, 2022Updated 3 years ago
- Rebuild of portspoof in GO with additional features.☆30Apr 7, 2026Updated last week
- Selective Disclosure JWT (SD-JWT) Draft 06 & Selective Disclosure JWT VC (sd-jwt-vc) Draft 01 implementation☆16Jul 30, 2024Updated last year
- SBOM Move - Automate build and transfer of SBOMs across systems☆26Apr 6, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆292Dec 6, 2025Updated 4 months ago
- A serverless sync server for Santa, built on AWS☆109Jun 13, 2025Updated 10 months ago
- Check security aspects of a second-level domain name.☆18May 31, 2024Updated last year
- Hierarchical Deterministic Keys for the European Digital Identity Wallet☆11Feb 23, 2026Updated last month
- Okta Verify and Okta FastPass Abuse Tool☆342Sep 4, 2024Updated last year
- ☆10May 3, 2023Updated 2 years ago
- Automated testing, generation & manipulation of #osquery packs☆74Updated this week
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆14Mar 18, 2026Updated 3 weeks ago
- Gram is Klarna's own threat model diagramming tool☆332Updated this week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆49Dec 29, 2023Updated 2 years ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆54Apr 7, 2026Updated last week
- Slides and resources for talks I've given☆55Jul 19, 2023Updated 2 years ago
- Canary Detection☆194Oct 20, 2025Updated 5 months ago
- Information about available credential formats☆14Nov 17, 2024Updated last year
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- A tool to extract cookies and passwords from major web browsers, passively, with no process injection.☆58Oct 31, 2025Updated 5 months ago