Avatar 🔐

Brennenstuhl on Security

Exploring usable security & website authentication with a foible for data breaches, account security and pass{keys, codes, words}.

  1. Home
  2. About me
  3. Knowledge Base
  4. Search
  5. Archives
  6. Disclaimer
    1. Dark Mode

Categories

Identity & Access Management Software Engineering Application Security Ethical Hacking Software Security

Tags

JWT OSS Password Security OIDC OAuth 2.0 SRE Usable Security AWS Defensive Security Git
Featured image of post Python Docopt: Convert Tuple List to Dictionary
Software Engineering

Python Docopt: Convert Tuple List to Dictionary

How to convert a list of tuples into a dictionary in Python. A quick and easy solution for beautiful command-line interfaces …

28. Apr 2015
1 minute read
Featured image of post How to Migrate SVN to GIT with History?
Software Engineering

How to Migrate SVN to GIT with History?

A small step-by-step example on how to move your source code from SVN to GIT.

15. Apr 2015
2 minute read
Featured image of post How to Check Github Licenses
Software Engineering

How to Check Github Licenses

Github Licker is a Github License Checker command line tool that helps you to keep an overview over your organisations OSS licenses. Try it out now!

25. Mar 2015
2 minute read
Featured image of post AWS Monocyte: Let's Build a Cloud Immune System
Software Security

AWS Monocyte: Let's Build a Cloud Immune System

Monocyte: A AWS Immune System. Comply to EU regulations by finding and deleting AWS resources in regions outside of Europe with AWS Monocyte!

18. Mar 2015
3 minute read
1 … 5 6
Brennenstuhl on Security
Made and hosted in the EU 🇪🇺 · Powered by Hugo & Stack
Imprint · Privacy