bedirhan / antipatternsLinks
Software Security Anti-Patterns
☆14Updated 6 years ago
Alternatives and similar repositories for antipatterns
Users that are interested in antipatterns are comparing it to the libraries listed below
Sorting:
- ☆29Updated 10 years ago
- ☆11Updated 3 years ago
- A repo for security analytics & threat hunting resources☆21Updated 7 years ago
- ☆12Updated 6 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Updated 3 years ago
- Adaptive eXocortex & Integrated Outer Memory Framework☆34Updated 5 years ago
- Scapy ile ilgili bir takım alıştırmalar ve bilgiler içerir☆29Updated 9 years ago
- Spin up a Digital Ocean droplet using Terraform and Ansible☆12Updated 4 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆32Updated 6 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Updated 3 years ago
- Password Lists for penetration testing, sorted by language.☆13Updated 8 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21Updated 2 years ago
- WIP - Revamped Alfred [2.0]☆40Updated 7 months ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Updated 8 years ago
- Unofficial api for cve.mitre.org☆40Updated 4 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 8 years ago
- ☆11Updated 8 years ago
- ☆15Updated 5 years ago
- ☆21Updated 7 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆112Updated 5 years ago
- Vulnerable Task Manager☆20Updated 10 months ago
- Go module for striping CDN IP ranges.☆23Updated 2 months ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- ☆29Updated 6 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆15Updated 5 years ago
- Embedded AppSec Best Practices☆43Updated last month
- Yet Another Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis☆112Updated 9 years ago
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- The New Hacking Framework☆18Updated 8 years ago