Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
A vulnerability is a weakness in design, implementation, operation, or internal control. An exploitable vulnerability is one for which at least one working attack or "exploit" exists. Vulnerabilities can be researched, reverse-engineered, hunted, or exploited using automated tools or customised scripts.
Thanks goes to these wonderful people (emoji key):
Ayush Kumar Shaw 💻 📖 📋 🤔 🚧 👀 |
Crio.Do 📋 |
Abel Mathew 💻 📖 🤔 🖋 |
Rishitha 💻 🖋 🤔 📖 |
Archithdwij 👀 📋 |
Kevin Paulose 👀 📋 |
Amogh Rajesh Desai 👀 📋 |
Sudhanshu tiwari 👀 📋 |
This project follows the all-contributors specification. Contributions of any kind welcome!