SecurityInnovation / Security-Best-PracticesLinks
A Security and Privacy Guide for non-technical users
☆45Updated 10 years ago
Alternatives and similar repositories for Security-Best-Practices
Users that are interested in Security-Best-Practices are comparing it to the libraries listed below
Sorting:
- ☆198Updated 10 years ago
- Overview Tooling Process Physical People☆49Updated 3 months ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- Searches various online resources to try and get as much info about an IP/domain as possible.☆100Updated 12 years ago
- A Github organization reconnaissance tool.☆218Updated 2 years ago
- Various Cheat Sheets related to development and security☆144Updated 5 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆34Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 6 years ago
- ☆58Updated 11 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 6 months ago
- Docker repository for OWTF (64-bit Kali)☆34Updated 3 months ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 3 weeks ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆119Updated 7 years ago
- Maltego integration of https://haveibeenpwned.com☆61Updated 10 months ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 15 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 13 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 3 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 10 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆67Updated 8 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- Maintain a list of tips and tricks to be used by Ubuntu users to secure their laptops.☆66Updated 6 years ago
- Legal, procedural and policies document templates for operating an IRT☆65Updated last year
- ☆90Updated 5 months ago
- ☆63Updated 10 years ago
- Maltego transforms for the ThreatCrowd search API☆47Updated 7 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 8 years ago