binarymist / HolisticInfoSec-For-WebDevelopers-Fascicle0Links
Overview Tooling Process Physical People
☆49Updated 2 months ago
Alternatives and similar repositories for HolisticInfoSec-For-WebDevelopers-Fascicle0
Users that are interested in HolisticInfoSec-For-WebDevelopers-Fascicle0 are comparing it to the libraries listed below
Sorting:
- VPS Network Cloud Web Applications☆25Updated 2 months ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Docker repository for OWTF (64-bit Kali)☆33Updated 2 months ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Metasploit Framework☆26Updated 3 months ago
- ☆29Updated 8 years ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆55Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 10 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 8 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 5 months ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- A list of collected articles and resources from the website Peerlyst☆17Updated 9 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- ☆93Updated 7 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 6 years ago
- Resources for developers and security engineers to learn the ropes of application security☆99Updated 7 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆34Updated 9 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆193Updated 8 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆52Updated 3 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 9 years ago
- A scripted library of hacking techniques.☆18Updated 7 years ago
- Passive recon / OSINT automation script☆39Updated 7 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Updated 3 years ago
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- ☆63Updated 10 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago