Application security best practices and code implementations for Java developers. This project is intended for didactic purposes only, supporting my training course.
-
Updated
Apr 13, 2025 - Java
Application security best practices and code implementations for Java developers. This project is intended for didactic purposes only, supporting my training course.
Free and open source log management
Este proyecto es un simulador de ciberseguridad diseñado para entornos educativos. Permite a estudiantes practicar técnicas de ataque y defensa en un entorno controlado, replicando situaciones reales de ciberseguridad sin riesgo para sistemas en producción.
Secure full-stack portfolio platform built with Flask. Features user authentication, role-based access, category-filtered project showcases, integrated cybersecurity tools, and admin-managed content. Includes security logging and is deployed with Render.
Windows EventLog Parse
These event viewer logs are worth monitoring for suspicious behavior
Run detections and view dashboards for your GitHub security logs to monitor and analyze activity across your GitHub accounts using Powerpipe and Tailpipe.
Chain of Custody is a tamper-proof forensic evidence system ensuring integrity, traceability, and availability through dual storage (Local + IPFS), fuzzy hashing, and a private blockchain with role-based access control. 4th Place @ CIDECODE 2.0
Add a description, image, and links to the security-logging topic page so that developers can more easily learn about it.
To associate your repository with the security-logging topic, visit your repo's landing page and select "manage topics."