Minimalist cheat sheet for developpers to write secure code
☆54Jul 17, 2020Updated 5 years ago
Alternatives and similar repositories for security-cheat-sheet
Users that are interested in security-cheat-sheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Material from presentations done by GoSecure researchers☆34Oct 10, 2023Updated 2 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Workshop given at Hack in Paris 2019☆126Jun 8, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Identify vulnerable libraries in Maven dependencies☆46Dec 14, 2022Updated 3 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- source code audit tool☆49May 9, 2021Updated 4 years ago
- FxCop rules that aim to help security audit on .NET applications.☆14Nov 10, 2017Updated 8 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago
- Attack data☆26Apr 20, 2018Updated 7 years ago
- Repository to showcase various configuration recipes with various technologies☆36Dec 16, 2022Updated 3 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- splunk_pentest_app☆50Apr 22, 2016Updated 9 years ago
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 6 months ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Rapid Assessment of Web Resources☆19Nov 11, 2016Updated 9 years ago
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- V1.0☆14Aug 8, 2016Updated 9 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 3 months ago
- VM escape (QEMU, VirtualBox, VMware)☆17Mar 21, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- My notes of Day1 Day2 will be posted here as journey☆17Jan 6, 2021Updated 5 years ago
- CTF(x) 2016 problem statements, files, and writeups☆16Jan 30, 2019Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Discord bot to display events and information about a CTFd instance (https://ctfd.io/)☆11Jul 9, 2024Updated last year
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated last month
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Jan 22, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆142Apr 29, 2020Updated 5 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- ☆72Jun 28, 2018Updated 7 years ago
- Easily create index of your SANS books☆18Oct 28, 2022Updated 3 years ago