cure53 / ContractsLinks
A small collection of potentially useful contract templates
☆417Updated 2 weeks ago
Alternatives and similar repositories for Contracts
Users that are interested in Contracts are comparing it to the libraries listed below
Sorting:
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆303Updated this week
- Websec interview questions by tib3rius answered☆307Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆227Updated 2 months ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆212Updated last year
- A checklist of practices for organizations dealing with account takeover (ATO)☆276Updated last year
- Docker toolbox for pentest of web based application.☆173Updated this week
- Private key usage verification☆432Updated 9 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆315Updated 5 months ago
- A curated list of Awesome Security Challenges.☆211Updated last year
- Watch the latest awesome security talks around the globe☆277Updated 10 months ago
- ☆419Updated 4 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆474Updated 7 months ago
- Identify privilege escalation paths within and across different clouds☆711Updated last week
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆323Updated last year
- My cheatsheet notes to pentest AWS infrastructure☆700Updated 3 years ago
- Awesome note-taking apps for hackers & pentesters !☆380Updated 5 years ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆411Updated 3 months ago
- University lecture on "IT Security" as Open Educational Resources material☆375Updated 2 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆312Updated 11 months ago
- A collection of awesome AWS S3 tools that collects and enumerates exposed S3 buckets☆406Updated 3 weeks ago
- Awesome information for WebSockets security research☆296Updated 4 years ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Updated last year
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆262Updated last week
- A Broken Application - Very Vulnerable!☆180Updated last week
- materials we hand out☆146Updated 6 months ago
- This repo is meant to be a list of companies that hire security people full remote.☆454Updated 7 months ago
- tool for generating wordlists or extending an existing one using mutations.☆389Updated this week
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆544Updated last week
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆223Updated last year
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆270Updated 2 years ago