SecurityInnovation / Security-Best-PracticesLinks
A Security and Privacy Guide for non-technical users
☆45Updated 10 years ago
Alternatives and similar repositories for Security-Best-Practices
Users that are interested in Security-Best-Practices are comparing it to the libraries listed below
Sorting:
- This repo contains all of my OS hardening scripts☆69Updated 8 years ago
- ☆198Updated 9 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 8 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆88Updated 11 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 7 years ago
- Various Cheat Sheets related to development and security☆144Updated 5 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆115Updated 6 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- Docker repository for OWTF (64-bit Kali)☆34Updated last month
- ☆63Updated 9 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 9 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆29Updated 2 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- A Github organization reconnaissance tool.☆219Updated 2 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆34Updated 9 years ago
- Maltego transforms for the ThreatCrowd search API☆49Updated 7 years ago
- Metasploit Framework☆26Updated 2 months ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 4 months ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆118Updated 7 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Legal, procedural and policies document templates for operating an IRT☆65Updated last year
- Scripts that are suited for blue teams☆33Updated 9 years ago
- ☆58Updated 11 years ago
- Maltego integration of https://haveibeenpwned.com☆62Updated 9 months ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- ☆90Updated 3 months ago
- Plugins written for CVE-Search☆27Updated 4 years ago
- NIST/NCCoE Mobile Threat Catalogue☆149Updated 4 months ago