cure53 / ContractsLinks
A small collection of potentially useful contract templates
☆406Updated 3 months ago
Alternatives and similar repositories for Contracts
Users that are interested in Contracts are comparing it to the libraries listed below
Sorting:
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆301Updated last week
- Websec interview questions by tib3rius answered☆311Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆226Updated 3 months ago
- Private key usage verification☆429Updated 5 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆301Updated last month
- Watch the latest awesome security talks around the globe☆278Updated 7 months ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆459Updated 3 months ago
- ☆395Updated 3 years ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆266Updated 3 weeks ago
- A curated list of Awesome Security Challenges.☆196Updated 10 months ago
- Identify privilege escalation paths within and across different clouds☆701Updated 3 weeks ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆706Updated last week
- Docker toolbox for pentest of web based application.☆166Updated last week
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆212Updated 10 months ago
- My cheatsheet notes to pentest AWS infrastructure☆688Updated 2 years ago
- ☆314Updated 2 months ago
- A checklist of practices for organizations dealing with account takeover (ATO)☆273Updated 11 months ago
- Awesome note-taking apps for hackers & pentesters !☆376Updated 4 years ago
- tool for generating wordlists or extending an existing one using mutations.☆388Updated 3 months ago
- A Broken Application - Very Vulnerable!☆172Updated last week
- Gram is Klarna's own threat model diagramming tool☆325Updated last month
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆228Updated 3 years ago
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆525Updated last week
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆402Updated 8 months ago
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆319Updated last year
- A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets☆384Updated last year
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆714Updated last year
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆357Updated 3 weeks ago
- Twitter vulnerable snippets☆1,069Updated 6 months ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆753Updated last year