SecurityInnovation / Security-Best-Practices
A Security and Privacy Guide for non-technical users
☆44Updated 9 years ago
Alternatives and similar repositories for Security-Best-Practices:
Users that are interested in Security-Best-Practices are comparing it to the libraries listed below
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆44Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Metasploit Framework☆26Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Burp extension that checks for interesting and security headers☆43Updated 4 years ago
- A collection of useful scripts for penetration testers☆82Updated 12 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- Content for 'Measuring Software Quality using Application Security' book published at LeanPub☆38Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 8 years ago
- DefectDojo Documentation☆16Updated 3 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 6 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Metasploit Usage Wiki☆49Updated 9 years ago
- ☆13Updated 7 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Funnel is a lightweight yara-based feed scraper☆39Updated last year
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 8 months ago
- Take output from nmap and turn it into something easily searchable and readable.☆33Updated 8 years ago
- Puny Domain Name Check☆36Updated 5 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Updated 7 years ago
- A curated threat modeling library collection☆22Updated last year
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- Plugins written for CVE-Search☆25Updated 3 years ago
- Python Remote Administration Tool☆13Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago