Toggle navigation
[日本語]
Login
Toggle navigation
Vulnerability Information
Vulnerability Search
JVN Vulnerability Search
NVD Vulnerability Search
CPE検索
List of CWE
Software Information
All
Operating Systems
Web Server
Database
Other Middleware
Programming language
Framework
CMS
Encryption
Virtualization
System Management Tool
Version Update History
Support Expiration Information
Information gathering
Provide Information Site
CheatSheet
Response Header
Directory Traversal
Network related
Information about Port numbers
Protocol Information
Tools
Check Access Source Information
Generate Password
HTML Escape
URL Encode・Decoding
Base64 Encode・Decoding
Numeric Character Reference Encoding・Decoding
About Secualive
Provide Information Site
Select Genre
All
media_news
security_company
tool
blog
organization
convenient_service
conference
ctf_bug_bounty
Low
framework
vulnerable_site
wordpress
proxy
tamper_detect
vulnerability_notification_site
firewall
Security Advisary
Document
Education,Training
Cloud Security Posture Management
Information Site Top
->
Low
This is a collection of sites about security.
The order is alphabetical.
Show Search Menu
URL
Name
Language
Number of items displayed
100
200
300
Add Tag
---------
News
Web Audit
Network Audit
Major
Tools
Foreign Country
Organization
Company
Celebrated Person
School
Government
Hacking
CMS
WordPress
Source Code Audit
Game Audit
Smartphone Audit
IoT Audit
Consulting
CTF
Qualifications
WAF
Education
Manipulation Detection
Endpoint Detection and Response(EDR)
Mail
Incident Response
Blog
Forensic
File Transfer
FW Audit
Pentest
E-Learning
Create Development Guidelines
Security enhancement support
Requirements Consulting
WAF Installation Support
Security Advisor
WordPress Security Enhancement
EC-CUBE Security Enhancement Support
Automatic Audit tools
System Development
Targeted Email Attack Training
Manipulation Detection
Windows
Linux/Unix
Mac OS
Open Source
Bug Bounty
SIEM
Vulnerability Management
Log Management
SOC
Hardware Audit
Android Application
Information Provision
Mail Security
Cloud Security
Database Audit
Support for PCIDSS
Building CSIRTs
Android
iOS
AWS
Open Source
Cheetsheet
Exploit
Cloud
Incorporated association
Automotive Audit
Virtual Currency Audit
Anti-tampering Audit
Smartphone App Development
Wireless LAN Audit
APT Attack Resistance Audit
Malware Audit
Building Active Directory
Secure app development environment
Website Malware Scan
Sandbox
ERP Security
Infra Security
Social engineering
MITB measures
Fraud Prediction Detection
SDK Development Kit
Countermeasures against malicious sites
FW Management
IDS/IPS Management
Active Directory Audit
Server Configuration Audit
Backup Service
DDos protection
Open Source Risk Detection
Database encryption
POS security
Blockchain Security
File Transfers
DNS security
Privacy Mark
Managed Security Service Provider (MSSP)
Managed Detection and Response (MDR)
Backups
Security Advisories
Antivirus software
Japan Corporation
Microsoft
Anti-virus software verification service
Documents
DevSecOps
OSS Security Detection
0Day Defense
RASP(Runtime Application Self Protection)
CDN
Data management and protection
Salesforce security Audit
IaaS Audit
Microsoft365 Audit
SaaS Audit
Sngle sign-on
Support for internalization of audit
Endpoint Audit
Monitoring
GDPR compliance
Cyber Security for Medical Institutions
Cyber Security Exercise
Antiphishing
ISO27001
Threat Intelligence
Law
IP address research
Fuzzing
Git
Google
Site Information Gathering
Malware and ransomware support
Server Robustness Support
AI
Vulnerability assessment Design document review
Physical Security
VOIP Audit
RedTeam
Wifi Audit
IPv6 Audit
Host Security Audit
Support for building a remote work environment
Ransomware resistance check
Wiretap and spy camera investigation
Performance survey
Support for acquisition of ISMS certification
Cyber Risk Management
Embedded Device Assessment
Insider Threat Assessment
Remote Security Assessment
Penetration Testing for Internal Attacks
AWS
AZUL
GCP
CSPM(Cloud Security Posture Management)
MISP
Internal information leakage countermeasures
System config and Management Support
Product Assessment
OSINT
1 / 1 - 合計 : 3
Low
No
Image
Name
URL
Description
Tag
1
Cyber Security Basic Law
https://elaws.e-gov.go.jp/document?lawid=426AC1000000104
The full text of the Basic Act on Cyber Security can be found here.sss
Japanese
Law
2
Act on Prohibition of Unauthorized Computer Access, etc.
https://elaws.e-gov.go.jp/document?lawid=411AC0000000128
The full text of the Act on the Prohibition of Unauthorized Computer Access can be found here.sss
Japanese
Law
3
Telecommunications Business Law
https://elaws.e-gov.go.jp/document?lawid=359AC0000000086
The full text of the Telecommunications Business Law can be found here. The Ministry of Internal Affairs and Communications (MIC) has compiled a PDF of the "Telecommunications Business Law" below. https://www.soumu.go.jp/main_content/000580688.pdfsss
Japanese
Law
1 / 1 - 合計 : 3
×
Display Dashboard Setting
The selected informational sites can be displayed on the dashboard.
You can easily access them from your dashboard by selecting the sites you are interested in.
×