SecurityInnovation / Security-Best-PracticesLinks
A Security and Privacy Guide for non-technical users
☆45Updated 10 years ago
Alternatives and similar repositories for Security-Best-Practices
Users that are interested in Security-Best-Practices are comparing it to the libraries listed below
Sorting:
- Take output from nmap and turn it into something easily searchable and readable.☆34Updated 9 years ago
- ☆198Updated 9 years ago
- VPS Network Cloud Web Applications☆24Updated 2 months ago
- Overview Tooling Process Physical People☆48Updated 2 months ago
- Docker repository for OWTF (64-bit Kali)☆33Updated 2 months ago
- ☆58Updated 11 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- A tool to generate statistics and help manage bug bounty reports in HackerOne.☆22Updated 5 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago
- A security scanner for Wordpress blogging engine☆32Updated 9 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆52Updated 3 years ago
- Simple (web-) application vulnerability management system☆21Updated 11 years ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆118Updated 7 years ago
- This repo contains all of my OS hardening scripts☆69Updated 8 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Scrapes information on vulnerabilities from US-CERT and parses them for further usage☆17Updated 5 years ago
- Honeypot (Dionaea and kippo) setup script☆83Updated 9 years ago
- A quick and dirty PCAP parser that helps you identify who your applications are sending sensitive data to without encryption.☆119Updated last year
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 15 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 7 years ago
- ☆75Updated 11 years ago
- A Github organization reconnaissance tool.☆218Updated 2 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 5 months ago
- My Presentations in PDF☆29Updated 9 years ago
- Various Cheat Sheets related to development and security☆144Updated 5 years ago
- Maintain a list of tips and tricks to be used by Ubuntu users to secure their laptops.☆66Updated 6 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆121Updated 5 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago