Awesome DNS Security is a curated list of tools, best practices, and resources focused on securing DNS infrastructure.
☆22Oct 11, 2024Updated last year
Alternatives and similar repositories for Awesome-DNS-Security
Users that are interested in Awesome-DNS-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆16Mar 18, 2026Updated 2 months ago
- Sample terraform repo with multiple resources and a workflow that uses tools to automate cost management, security checks, best practices…☆10Jun 24, 2021Updated 4 years ago
- The JetRails 2FA plugin adds an extra layer of security to your Magento store. User based 2FA enablement ensures that admin users are fo…☆11Oct 12, 2024Updated last year
- Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best …☆19May 12, 2026Updated last week
- 🏣 Amazon Web 🏪 Services through 🕍 hands-on 🏘 projects real 🚂 world use cases 🚋 and guided 🚒 tutorials Perfect 🚜 developers ⛸ Dev …☆34May 11, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This project demonstrates deploying a secure, scalable Generative AI (GenAI) solution on Azure using a Retrieval-Augmented Generation (RA…☆18Feb 27, 2025Updated last year
- AI-Powered Code Reviews for Best Practices & Security Issues Across Languages☆21Aug 8, 2025Updated 9 months ago
- Burp Suite plugin created for using Collaborator tool during manual testing☆19Feb 4, 2022Updated 4 years ago
- AWS multi-account setup via IAC, with scripts for bootstrapping and custom usage☆17Mar 1, 2026Updated 2 months ago
- Ansible playbook for setting up a secure and private homelab with multiple machines, following ansible-lint best practices and implementi…☆14Jun 16, 2025Updated 11 months ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Mar 6, 2017Updated 9 years ago
- A collection of best practices, research, and tools for enhancing security in Web3 applications. Covers smart contract vulnerabilities, b…☆15Feb 12, 2025Updated last year
- A collection of Docker resources, including comprehensive tools and best practices for container management, monitoring, security, automa…☆17May 30, 2025Updated 11 months ago
- A Machine Learning Model that detects if a text contains hate speech or not☆12Aug 22, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Implementation of mod_security rules and Apache best practices for CentOS 5,6,7☆15May 4, 2017Updated 9 years ago
- NuLink network is a decentralized solution for privacy-preserving applications developers to implement best practices and best of breed s…☆13Oct 30, 2024Updated last year
- Implemented encryption/decryption and signing/verification according to Google's own best security practices.☆19Jun 16, 2023Updated 2 years ago
- *READY TO USE* Terraform baseline for implementing essential AWS security best practices, including Organizations, SSO, MFA, SCPs, Budget…☆25Nov 2, 2024Updated last year
- A simple way to evaluate the security of your Kubernetes deployment against sets of best practices defined by various community sources☆28Jan 31, 2020Updated 6 years ago
- Best Practices for Deploying X-Road Security Servers on AWS☆19Nov 30, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Jun 14, 2023Updated 2 years ago
- URL Fuzzer☆21Nov 22, 2024Updated last year
- NextJs middleware toolkit to secure your next server with flexibility and ease. Default configurations are based on best practices and se…☆20Sep 1, 2025Updated 8 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A hub for our collection of security best practices for Drupal. - https://openconcept.ca/drupal-security-best-practices-practical-guide☆24Jul 25, 2018Updated 7 years ago
- wordpress security best practice☆29Jun 5, 2024Updated last year
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆26Jun 28, 2020Updated 5 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- Explore the realm of Bluetooth Penetration Testing through our comprehensive website. Learn about different techniques, tools, and best p…☆30Aug 28, 2024Updated last year
- A policy pack of rules to enforce AWS best practices for security, reliability, cost, and more!☆39Feb 28, 2026Updated 2 months ago
- THOR APT Scanner User Manual☆21Updated this week
- Downlaod all the nuclei Templates created from many Bug Hunters☆30May 25, 2023Updated 2 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆10Feb 26, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- My custom created nuclei for SQLi, bugbounty, pentesting☆28May 7, 2025Updated last year
- '60 Days of Python' will provide you a complete guideline to learn Python for Free of Cost. Visit - https://www.youtube.com/playlist?list…☆31Jul 12, 2024Updated last year
- The training will consist of five classes, each lasting 2.5 hours, spread over five consecutive days.☆37May 21, 2024Updated last year
- Updated January 2016 Note on translation: These Website Terms of Service may have been translated into various languages for the conveni…☆29Apr 6, 2017Updated 9 years ago
- Provide AI agents with full Tor network access and dark web data through a zero-config OpenClaw skill or standalone tool.☆192Updated this week
- ☆35Feb 6, 2026Updated 3 months ago
- WEBFANG, is my first CLI, a modular OSINT & Reconnaissance toolkit curated for Ethical Hackers and Red-Teamers. Sink fangs into web targe…☆115Apr 9, 2026Updated last month