Checklists
☆16Sep 22, 2016Updated 9 years ago
Alternatives and similar repositories for checklists
Users that are interested in checklists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tips to protect your personal and company data☆27May 14, 2020Updated 5 years ago
- CISOfy Handbook☆35Sep 15, 2016Updated 9 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆93May 14, 2020Updated 5 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 8 months ago
- ☆12Dec 16, 2016Updated 9 years ago
- ☆15Jun 27, 2024Updated last year
- A tool to generate statistics and help manage bug bounty reports in HackerOne.☆22Mar 18, 2020Updated 6 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- 🦫 Hop server side SDK for Go☆12May 30, 2023Updated 2 years ago
- Travis builds for certbot.eff.org☆12Jan 19, 2022Updated 4 years ago
- ☆21Nov 5, 2011Updated 14 years ago
- ☆26Mar 11, 2025Updated last year
- ⚡️ A curated list of awesome things related to Infisical☆23Oct 16, 2023Updated 2 years ago
- A template repo used by Autonomous Systems and Robotics Group for ML projects☆16Mar 8, 2023Updated 3 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 6 months ago
- EA-HAS-Bench: Energy-Aware Hyperparameter and Architecture Search Benchmark (ICLR Spotlight 2023)☆18Dec 8, 2024Updated last year
- GhostSec Scam Detection Tool☆15Feb 11, 2021Updated 5 years ago
- Windows Network File System Remote exploit for CVE-2022-30136☆14Jul 11, 2023Updated 2 years ago
- Shell scripts to audit OS X security using CIS Benchmarks.☆18Aug 9, 2016Updated 9 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- 🐰 Rust client library for the Leap Edge socket service☆12Oct 8, 2023Updated 2 years ago
- This proxy signs requests with AWS IAM credentials.☆13Jul 11, 2023Updated 2 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- Python program for creating static HTML image galleries☆23Jul 10, 2015Updated 10 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- Run desktop applications in a Docker container☆13Jun 16, 2017Updated 8 years ago
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- Scripts to recursively search for, then convert .htaccess files to a single httpd.conf☆33Oct 30, 2011Updated 14 years ago
- Home of https://scapy.net☆13Dec 26, 2025Updated 2 months ago
- K8s authn/ authz webhook that integrates with Athenz☆16Mar 10, 2023Updated 3 years ago
- Simple IRC Bot for flooding☆11Sep 12, 2011Updated 14 years ago
- Clone network interface from one host as a tap interface on another host☆61Dec 10, 2020Updated 5 years ago
- Install Phabricator on Ubuntu 16.04 Xenial with Ansible☆11Oct 18, 2017Updated 8 years ago
- 📟🤖 PagerDuty Discord Webhook Relay☆15Nov 11, 2022Updated 3 years ago
- Creates a PDF report out of PCP archive files collected via pmlogger☆11Aug 5, 2021Updated 4 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 8 months ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago