Personal security checklist for securing your devices and accounts.
☆280Oct 2, 2019Updated 6 years ago
Alternatives and similar repositories for personal-security-checklist
Users that are interested in personal-security-checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An introduction to security for developers.☆28Feb 14, 2021Updated 5 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- writing about mapping is like dancing about architecture☆17Sep 18, 2016Updated 9 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Tracking the tools I've found useful☆14Feb 28, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- A CLI tool that scans a source directory and gives statistics and a big list of files that are and are not flow-annotated.☆10May 11, 2019Updated 6 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- Take a readable stream of OSM XML and output a stream of objects☆19Jan 23, 2020Updated 6 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Color a GeoJSON FeatureCollection so that contiguous areas have different fills☆13Apr 13, 2016Updated 9 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- Implements Student's T-Distribution to identify minimum sample sizes☆14Mar 24, 2023Updated 3 years ago
- Detect Phishing with Bro IDS☆18Feb 1, 2017Updated 9 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- A command line Hash Identifying tool.☆101Mar 17, 2019Updated 7 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Duncan - Blind SQL injector skeleton☆60Jan 11, 2022Updated 4 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A dsniff project using bro☆11Jan 25, 2016Updated 10 years ago
- simple geocoder comparison tool☆13Jun 19, 2014Updated 11 years ago
- ☆128Oct 19, 2016Updated 9 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Join a stream of GeoJSON against a dataset.☆36Aug 23, 2018Updated 7 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PoC for an adaptive parallelised DNS prober☆44Oct 4, 2017Updated 8 years ago
- List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built in…☆131Oct 2, 2020Updated 5 years ago
- A Github organization reconnaissance tool.☆218May 22, 2023Updated 2 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆106May 30, 2017Updated 8 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Jan 21, 2020Updated 6 years ago