jerrinss5
Application Security Engineer | Software Developer | Security Enthusiast | Curious | Self learner | Tinkerer
Pinned Repositories
AndroidApp
Learning Android application development
ContactManager
A rest API to authenticate a user and let it access contact details from a json file
CSP-Listener
CSP Report listener - This service can be used to listen to CSP Violations generated
go-conccurency-example
Basic understanding of go concurrency with channels and wait groups
GoLangStuff
Go Lang Practice code
Multi-threaded-Proxy-Server
Multi-threaded simple proxy server in Python with file caching
nginx-token-validation-openresty
Using nginx openresty framework with lua script for token validation
Non-recursive-zip-bombs
Understanding how non recursive zip bombs are assembled and disassembled by the parsers
RequestSignerVerifier
An application to verify request going through firewall and being verified at AWS API Gateway
Secure-Scanner-Application
Secure Scanner Application to scan C, C++, Python, Perl and PHP using Rats and Flawfinder
jerrinss5's Repositories
jerrinss5/Multi-threaded-Proxy-Server
Multi-threaded simple proxy server in Python with file caching
jerrinss5/ContactManager
A rest API to authenticate a user and let it access contact details from a json file
jerrinss5/go-conccurency-example
Basic understanding of go concurrency with channels and wait groups
jerrinss5/GoLangStuff
Go Lang Practice code
jerrinss5/Secure-Scanner-Application
Secure Scanner Application to scan C, C++, Python, Perl and PHP using Rats and Flawfinder
jerrinss5/AndroidApp
Learning Android application development
jerrinss5/CSP-Listener
CSP Report listener - This service can be used to listen to CSP Violations generated
jerrinss5/nginx-token-validation-openresty
Using nginx openresty framework with lua script for token validation
jerrinss5/Non-recursive-zip-bombs
Understanding how non recursive zip bombs are assembled and disassembled by the parsers
jerrinss5/RequestSignerVerifier
An application to verify request going through firewall and being verified at AWS API Gateway
jerrinss5/ChatApplication
Python multi-threaded chat application
jerrinss5/cis-dil-benchmark
CIS Distribution Independent Linux Benchmark - InSpec Profile
jerrinss5/dd-import
A utility to (re-)import findings and language data into DefectDojo
jerrinss5/django-DefectDojo
DefectDojo is a DevSecOps and vulnerability management tool.
jerrinss5/go-jiraintegration
Sample Go program which creates epic, projects and queries projects. Based on github.com/andygrunwald/go-jira
jerrinss5/go-vault-secret-fetch
Fetch secrets from Hashicorp vault from any AWS services using AWS IAM Auth
jerrinss5/java-kms-envelope-encryption
Program to encrypt and decrypt a file using envelope encryption via AWS KMS and normal AES GCM mode
jerrinss5/JavaSpringVulny-app
jerrinss5/jenkins-go-test
Testing jenkins go example.
jerrinss5/MonkeyBananaGame
Using state design pattern for various monkey actions
jerrinss5/Multi-threaded-FTP-Application
Multi-threaded FTP Application in Java
jerrinss5/mws-restaurant-stage-1
Starter Code for the Udacity's "Mobile Web Specialist Restaurant Reviews App: Stage 1" Project
jerrinss5/mws-restaurant-stage-2
Development server for students completing stage two of the restaurant reviews project for Mobile Web Specialist Nanodegree
jerrinss5/mws-restaurant-stage-3
Development server for students completing stage three of the restaurant reviews project for Mobile Web Specialist Nanodegree
jerrinss5/portieris
A Kubernetes Admission Controller for verifying image trust with Notary.
jerrinss5/s3-public-bucket-fetch
This program can be used to check if your s3 bucket can be fetched publicly with just any AWS authenticated user
jerrinss5/secure-code-review-checklist
A starter secure code review checklist
jerrinss5/Security_Engineer_Interview_Questions
Every Security Engineer Interview Question From Glassdoor.com
jerrinss5/simple-java-maven-app
For an introductory tutorial on how to use Jenkins to build a simple Java application with Maven.
jerrinss5/Threat-Model-101
My notes on how to perform a threat model