A crate built on top of `axum-sessions`, implementing the CSRF Synchronizer Token Pattern
-
Updated
Nov 6, 2024 - Rust
A crate built on top of `axum-sessions`, implementing the CSRF Synchronizer Token Pattern
Use Django To Introduce CSRF and Cookies , Session 📝
Todo Management Spring Boot 2.0.4.RELEASE) + Spring MVC + Spring Security (simple Login)+ JSP + Hibernate + MySQL + Audit with Envers + CSRF + Synchronizer token
Prevention of CSRF using Synchronizer Token Pattern
This demostrates Synchronizer Token Pattern for Preventing CSRF attacks. This implementation uses Spring JPA, Spring Security and JSP as Tecnology stack
This code and the concept explained in my blogpost
Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website where unauthorised commands are transmitted from a user that the web application trusts
CSRF Synchronizer Token Pattern - PHP
Cross-site Request Forgery protection in web application( Used SynchronizerTokenPattern )
A demo application to showcase the synchronizer token pattern used to overcome CRFS attacks in websites.
Example project to explain how Synchronizer Token Pattern works
Add a description, image, and links to the synchronizer-token-pattern topic page so that developers can more easily learn about it.
To associate your repository with the synchronizer-token-pattern topic, visit your repo's landing page and select "manage topics."