A static website template for security pages.
☆54Jul 19, 2025Updated 8 months ago
Alternatives and similar repositories for security-template
Users that are interested in security-template are comparing it to the libraries listed below
Sorting:
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆41Aug 2, 2018Updated 7 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Jan 27, 2020Updated 6 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆472Nov 10, 2022Updated 3 years ago
- Some random scripts. Just trying to be like the cool kids.☆101Jul 1, 2018Updated 7 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- A linux based program that encrypts or decrypts a file☆12Jan 5, 2022Updated 4 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆166Nov 6, 2019Updated 6 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆74Dec 4, 2019Updated 6 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- Trend Vision One API cookbook sample code☆14Mar 4, 2026Updated 2 weeks ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- A website outlining my bounty hunt game.☆11Oct 13, 2019Updated 6 years ago
- ☆19Jul 9, 2019Updated 6 years ago
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- Spaghetti - Web Application Security Scanner☆21Aug 11, 2017Updated 8 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Dec 6, 2024Updated last year
- Scan DockerHub images that match a keyword to find secrets.☆60Feb 17, 2021Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- ☆13Feb 12, 2017Updated 9 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- S3 bucket enumerator☆43Dec 3, 2017Updated 8 years ago
- ☆10May 18, 2016Updated 9 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Feb 12, 2019Updated 7 years ago
- ☆17Mar 10, 2026Updated last week
- zero-crossing based pitch detection for whistling☆18Feb 21, 2026Updated 3 weeks ago
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago