A Central Location For Everything You Need To Start Your Own Security Program In Your Organisation.
☆24Sep 22, 2019Updated 6 years ago
Alternatives and similar repositories for SecurityInABox
Users that are interested in SecurityInABox are comparing it to the libraries listed below
Sorting:
- Security Assessment Data Management and Analysis Tool☆38May 6, 2021Updated 4 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Aug 21, 2018Updated 7 years ago
- Public SOA modules and information☆50Feb 17, 2026Updated 2 weeks ago
- Cura 5.x plugin for including thumbnail/preview images in gcode files for Elegoo Neptune 3 Pro, Plus and Max.☆13May 12, 2023Updated 2 years ago
- ☆11Jul 10, 2024Updated last year
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- Automate scans using Qualys SSL Labs☆19Mar 10, 2020Updated 5 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Python scripts to control and read status of Yamaha SR-C20A soundbar with web and MQTT interfaces.☆10Jan 29, 2026Updated last month
- ☆12Sep 18, 2015Updated 10 years ago
- ☆12Aug 8, 2024Updated last year
- ☆13Dec 28, 2024Updated last year
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- Website repo☆11Sep 22, 2020Updated 5 years ago
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Julia rules for semgrep☆14Dec 9, 2025Updated 2 months ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 9 years ago
- Build and publish Docker images, run builds/tasks within Docker containers or on remote hosts.☆16Updated this week
- ☆17Mar 10, 2025Updated 11 months ago
- Functions for calling the Microsoft Graph API with PowerShell, for Azure AD Conditional Access Policies and Groups, as well as Endpoint M…☆12Jun 3, 2025Updated 9 months ago
- Bithoven is a smart contract language for composing powerful and secure instruments on Bitcoin. LR(1) parser with static analysis for com…☆41Updated this week
- automated penetration toolkit☆12Jul 9, 2016Updated 9 years ago
- Quickly identify the ownership of hosts to identify scope during penetration tests☆13Jul 19, 2024Updated last year
- my n00b notes on web_study☆16May 29, 2025Updated 9 months ago
- PowerShell Scripts☆13May 7, 2021Updated 4 years ago
- This solution presents a traditional 3-tier architecture in AWS.☆15May 1, 2023Updated 2 years ago
- Repository for OWASP Code Review document☆17Jun 24, 2014Updated 11 years ago
- 📈 Stock screener and portfolio analyzer, providing key insights on financial reports, news articles and more!☆13Jun 24, 2019Updated 6 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 2 months ago
- Type qualifiers for C☆16Sep 21, 2011Updated 14 years ago
- Detect the server side language used for the website☆13Mar 23, 2021Updated 4 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago
- Based on shawarkhanethicalhacker/BruteXSS☆15Jan 24, 2019Updated 7 years ago
- A scriptable debugger library to interact with Android applications☆46Sep 27, 2013Updated 12 years ago