bedirhan / antipatternsLinks
Software Security Anti-Patterns
☆14Updated 5 years ago
Alternatives and similar repositories for antipatterns
Users that are interested in antipatterns are comparing it to the libraries listed below
Sorting:
- ☆29Updated 10 years ago
- ☆11Updated 8 years ago
- Scapy ile ilgili bir takım alıştırmalar ve bilgiler içerir☆29Updated 9 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆16Updated 2 years ago
- CTF Tasks for HackMETU'16, with some attack vectors☆5Updated 9 years ago
- Pythonic world - Python 3.x☆37Updated 5 years ago
- Adaptive eXocortex & Integrated Outer Memory Framework☆34Updated 5 years ago
- ☆12Updated 6 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆111Updated 5 years ago
- ☆11Updated 2 years ago
- Tools to automate AWS Cloud security assessments☆25Updated 5 years ago
- ☆27Updated 9 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- A repo for security analytics & threat hunting resources☆21Updated 6 years ago
- ☆20Updated 6 years ago
- Python for Hackers Examples☆3Updated 9 years ago
- The knife of the Admin & Security auditor☆42Updated 5 years ago
- Slides from presentations I give!☆25Updated 2 months ago
- ☆15Updated 5 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆156Updated 2 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- SSL certificate parsing for humans☆37Updated last year
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Updated 10 years ago
- Sigma Engine implementation in TypeScript☆28Updated 2 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Updated 8 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- ☆39Updated 2 years ago
- List of metadata service endpoints for different cloud providers for your pentesting needs.☆14Updated 6 years ago
- Scenario-based WiFi Network Threat Simulation☆9Updated 5 years ago
- Materials used by Product Management and Product Marketing☆12Updated 6 years ago