Orange-Cyberdefense / reverse-proxy-authLinks
A Nginx reverse proxy that authenticates users using their personal certificates. Includes everything to create and revoke those certificates, create the CA and even TLS certificates for websites.
☆29Updated 4 years ago
Alternatives and similar repositories for reverse-proxy-auth
Users that are interested in reverse-proxy-auth are comparing it to the libraries listed below
Sorting:
- A web front-end for password cracking and analytics☆16Updated 7 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23Updated 3 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆63Updated 5 years ago
- Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, Microsoft Azure, and Digital Ocean simultaneousl…☆18Updated last year
- URL fingerprinting made easy☆90Updated last year
- ☆17Updated 4 years ago
- ☆16Updated 3 months ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆32Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Updated 3 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆41Updated 11 months ago
- A collection of personal ZAP scripts☆13Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Updated 2 months ago
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆28Updated 2 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆22Updated 5 years ago
- ☆12Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Shodan Monitoring integration for TheHive.☆130Updated last year
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- ☆14Updated 5 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 7 months ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- High signal information security sources Goggle.☆67Updated 2 years ago