Web Application Security Checklist
☆135Apr 10, 2025Updated 11 months ago
Alternatives and similar repositories for security_checklist
Users that are interested in security_checklist are comparing it to the libraries listed below
Sorting:
- A simple Nginx-based TLS 1.3 proxy with Let's Encrypt automatic certificate renewals☆13Apr 22, 2025Updated 10 months ago
- All checklists☆27Mar 26, 2019Updated 6 years ago
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- Capture the flag Game☆17Apr 14, 2025Updated 11 months ago
- Probely Agent for On-Premises Scans☆22Updated this week
- 🐞 Understand how cross-site scripting occurs, how to detect and exploit XSS vulnerabilities, giving you control of other visitor's brows…☆13Nov 24, 2025Updated 3 months ago
- A checklist for defending private or corporate networks.☆17Jan 1, 2020Updated 6 years ago
- ☆15Jan 27, 2022Updated 4 years ago
- ☆72Sep 18, 2020Updated 5 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- Check CPAN modules for known security vulnerabilities☆21Mar 9, 2026Updated last week
- ☆14Jan 8, 2026Updated 2 months ago
- Check whether a Government of Canada domain is adhering to best security practices.☆13Jan 21, 2021Updated 5 years ago
- Checklist of the most important security countermeasures when designing, creating, testing your web/mobile application☆645Apr 10, 2020Updated 5 years ago
- ☆13Aug 1, 2023Updated 2 years ago
- the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine …☆50Nov 2, 2021Updated 4 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- A fast web services mass scanner 🕵🏻♂️☆56Jun 4, 2021Updated 4 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Jun 13, 2023Updated 2 years ago
- OWASP Application Security Verification Standard 4.0 Checklist☆33Apr 15, 2019Updated 6 years ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Oct 1, 2024Updated last year
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Jan 10, 2023Updated 3 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 6 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- Important files in the document root which get downloaded without links.☆14Apr 10, 2023Updated 2 years ago
- ☆19Jun 24, 2024Updated last year
- checklist for testing the web applications☆285Feb 25, 2023Updated 3 years ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆12Oct 16, 2025Updated 5 months ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆15Mar 11, 2024Updated 2 years ago
- A Gradle plugin for checking whether an .apk or an .aar contains OpenSSL versions with known vulnerabilities☆12Nov 28, 2016Updated 9 years ago
- ☆196Feb 26, 2023Updated 3 years ago