cure53 / ContractsLinks
A small collection of potentially useful contract templates
☆399Updated 3 weeks ago
Alternatives and similar repositories for Contracts
Users that are interested in Contracts are comparing it to the libraries listed below
Sorting:
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆218Updated last week
- Websec interview questions by tib3rius answered☆309Updated last year
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆209Updated 7 months ago
- My cheatsheet notes to pentest AWS infrastructure☆677Updated 2 years ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆402Updated 5 months ago
- Watch the latest awesome security talks around the globe☆275Updated 4 months ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆431Updated last week
- Private key usage verification☆430Updated 2 months ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆295Updated this week
- Gram is Klarna's own threat model diagramming tool☆320Updated last month
- This repo is meant to be a list of companies that hire security people full remote.☆447Updated 3 weeks ago
- ☆391Updated 3 years ago
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆499Updated 2 weeks ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆246Updated 2 years ago
- GraphQL automated security testing toolkit☆320Updated last year
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆229Updated 4 months ago
- Attack surface detector that identifies endpoints by static analysis☆712Updated last week
- Secrets scanner that understands code☆188Updated last year
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆870Updated last year
- Security Auditor Utility for GraphQL APIs☆477Updated 4 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆420Updated 5 months ago
- A Broken Application - Very Vulnerable!☆163Updated last week
- This is a companion to the Security Engineer Questions☆203Updated last year
- tool for generating wordlists or extending an existing one using mutations.☆386Updated this week
- Create your own vulnerable by design AWS penetration testing playground☆382Updated 2 months ago
- Awesome cloud enumerator☆1,018Updated 3 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆118Updated last year
- ☆490Updated last year
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆189Updated 3 years ago
- Awesome information for WebSockets security research☆271Updated 3 years ago