Flexible guide to performing code review
☆10Jul 17, 2017Updated 8 years ago
Alternatives and similar repositories for code-review-checklist
Users that are interested in code-review-checklist are comparing it to the libraries listed below
Sorting:
- These are the checklists I use for code reviews on Force.com projects.☆31Jul 31, 2017Updated 8 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- A list of all projects by UW CSE students.☆11Feb 8, 2016Updated 10 years ago
- ☆45Oct 22, 2024Updated last year
- reference implementation of GA4GH WGS Quality Control Standards☆11Nov 25, 2025Updated 3 months ago
- 企业ip网段快速收集☆12Sep 25, 2023Updated 2 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Scaler Academy - Software Engineering Bootcamp☆11Jan 8, 2024Updated 2 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- Publicly shared Software Templates and Checlists☆13Mar 24, 2015Updated 10 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Project management checklist☆14Apr 14, 2025Updated 10 months ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- 安卓activity劫持演示demo,包含指定activity位于前台时的劫持和指定进程位于前台时的劫持☆15Dec 20, 2018Updated 7 years ago
- A hardly exhaustive collection of boxes to check☆14Nov 24, 2017Updated 8 years ago
- python编写的的xss漏洞检测工具,selenium☆11May 29, 2018Updated 7 years ago
- 自动化XSS漏洞检测工具☆12Jun 21, 2018Updated 7 years ago
- Get vue-router routes config from file system.☆12Oct 26, 2018Updated 7 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- Information Security using Steganography over Cryptography☆14Aug 31, 2024Updated last year
- dotfiles for vim, bash, git, irb, tmux☆17Aug 27, 2025Updated 6 months ago
- Cover your head. Security headers middlware☆21Dec 5, 2013Updated 12 years ago
- A simple chat app☆16Dec 7, 2022Updated 3 years ago
- Checklists☆16Sep 22, 2016Updated 9 years ago
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆15Aug 8, 2022Updated 3 years ago
- nmap模块扫描端口服务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- Full frontend code for the getrumin.com web app☆16Nov 30, 2021Updated 4 years ago
- Extensible vulnerable AI Bot to illustrate vulnerabilities in LLM applications.☆20Jun 17, 2024Updated last year
- ☆18Dec 24, 2021Updated 4 years ago
- Ref: API-Security-Checklist☆14Mar 31, 2023Updated 2 years ago
- A checklist of project management + development todos☆21Apr 25, 2010Updated 15 years ago
- Beacon v2 Reference Implementation (API)☆18Dec 13, 2024Updated last year
- A library for compressing, encrypting, and querying alignment data.☆15Jul 6, 2016Updated 9 years ago
- FTP Server based on Python.☆13Oct 22, 2012Updated 13 years ago
- Junior Dev Website☆11Oct 4, 2022Updated 3 years ago
- A list of important security checks for GitHub individual and organization accounts☆15Jan 1, 2018Updated 8 years ago
- Library to read the Keybase Merkle root out of the Stellar blockchain☆12Jul 18, 2023Updated 2 years ago