Skip to content
View giga-a's full-sized avatar
🍺
🍺

Organizations

@qeeqbox

Block or report giga-a

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

blind-sql-injection

2 Updated Jul 31, 2025

An adversary may utilize a sim swapping attack for defeating 2fa authentication

19 4 Updated Jan 29, 2024

vulnerable-web-app

HTML 2 Updated Jul 31, 2025

qeeqbox.github.io/network-security-for-qeeqs

HTML 1 Updated Jun 17, 2025
1 Updated Jan 28, 2024

A threat actor may cause a vulnerable target to include/retrieve local file

1 Updated Jan 29, 2024

A threat actor may cause a vulnerable target to include/retrieve remote file

1 Updated Jan 29, 2024

A threat actor may tamper with a stream that gets deserialized on the target, causing the target to access data or perform non-intended actions

1 Updated Jan 29, 2024

A threat actor may send a malicious redirect request for a vulnerable target to a victim; the victim gets redirected to a malicious website that threat actor controls

2 Updated Jul 28, 2025

A threat actor may inject arbitrary operating system (OS) commands on target

1 Updated Jul 28, 2025

A threat actor is any person, group, or entity that could harm to the cyber realm

2 Updated Jan 29, 2024

The practice of ensuring that people or objects have the right level of access to assets

1 Updated Jan 29, 2024

Countermeasures or safeguards for detecting, preventing, and mitigating cyber threats and attacks (Protect assets)

1 Updated Jan 29, 2024

Safeguarding your personal information (How your info is protected)

1 Updated Jan 29, 2024

HTTPS Proxy Firewall for testing

Python 2 Updated Mar 5, 2023

Data compliance is the process of following various regulations and standards to ensure that sensitive digital assets (data) are guarded against loss, theft, and misuse

3 Updated Jan 29, 2024

Data classification defines and categorizes data according to its type, sensitivity, and value

1 Updated Jan 29, 2024

A threat actor may trick a victim into executing native template syntax on a vulnerable target

3 1 Updated Jan 29, 2024

A threat actor may alter the template syntax on the vulnerable target to execute commands

1 Updated Jan 29, 2024

A threat actor may alter structured query language (SQL) query to read, modify and write to the database or execute administrative commands for further chained attacks

1 Updated Jul 28, 2025

A threat actor may alter the XML path language (XPath) query to read data on the target

1 Updated Jan 29, 2024

A threat actor may interfere with an application's processing of extensible stylesheet language transformations (XSLT) for extensible markup language (XML) to read or modify data on the target

2 Updated Jan 29, 2024

A threat actor may interfere with an application's processing of extensible markup language (XML) data to view the content of a target's files

2 Updated Jan 29, 2024

Access Control is using security techniques to protect a system against unauthorized access

1 Updated Jan 29, 2024

Data states refer to structured and unstructured data divided into three categories (At Rest, In Use, and In Transit)

1 Updated May 30, 2023
Next