cure53 / ContractsLinks
A small collection of potentially useful contract templates
☆400Updated last month
Alternatives and similar repositories for Contracts
Users that are interested in Contracts are comparing it to the libraries listed below
Sorting:
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆296Updated this week
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆220Updated last month
- Websec interview questions by tib3rius answered☆308Updated last year
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆209Updated 8 months ago
- ☆391Updated 3 years ago
- A curated list of Awesome Security Challenges.☆186Updated 8 months ago
- My cheatsheet notes to pentest AWS infrastructure☆681Updated 2 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆435Updated last month
- Private key usage verification☆430Updated 3 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆294Updated last year
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆500Updated this week
- This repo is meant to be a list of companies that hire security people full remote.☆447Updated last month
- Watch the latest awesome security talks around the globe☆275Updated 4 months ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆256Updated last week
- A checklist of practices for organizations dealing with account takeover (ATO)☆269Updated 9 months ago
- Identify privilege escalation paths within and across different clouds☆699Updated 3 weeks ago
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆692Updated last year
- tool for generating wordlists or extending an existing one using mutations.☆386Updated 3 weeks ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆394Updated last year
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆298Updated 5 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆247Updated 2 years ago
- A Broken Application - Very Vulnerable!☆163Updated 2 weeks ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆274Updated 9 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆680Updated 2 weeks ago
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆316Updated 11 months ago
- Docker toolbox for pentest of web based application.☆160Updated this week
- Awesome information for WebSockets security research☆271Updated 3 years ago
- A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets☆376Updated last year
- Awesome note-taking apps for hackers & pentesters !☆372Updated 4 years ago
- Twitter vulnerable snippets☆1,055Updated 3 months ago