EdOverflow / security-template
A static website template for security pages.
☆50Updated 8 months ago
Alternatives and similar repositories for security-template:
Users that are interested in security-template are comparing it to the libraries listed below
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- An MSF plugin to send notifications to Slack when shells are created or killed☆14Updated 8 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆38Updated 6 years ago
- retrive metadata endpoint data with these one liners.☆38Updated 4 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- AWS Security Checks☆39Updated 7 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 7 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Scripts for AWS amusement...☆21Updated 3 years ago
- Scans crossdomain.xml policies for expired domain names.☆25Updated 9 years ago
- Scans packages in npm and pypi for secrets☆31Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- A tool to evaluate Content Security Policies.☆71Updated 4 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Updated 6 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- A git submodule list containing all the tools repo's you'll ever need.☆27Updated 5 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- An Extended, Modulair, Host Discovery Framework☆43Updated 6 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆19Updated 4 years ago
- ☆18Updated last year