disclose / diotermsLinks
Open-source vulnerability disclosure policy templates.
☆68Updated 3 years ago
Alternatives and similar repositories for dioterms
Users that are interested in dioterms are comparing it to the libraries listed below
Sorting:
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 5 months ago
- Github dorking tool☆135Updated 3 years ago
- Vulnerability disclosure policies in the US Government's executive branch☆37Updated 2 years ago
- Static website for security.txt.☆68Updated 2 months ago
- ☆23Updated last year
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆72Updated 5 years ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Updated 4 years ago
- Golang installer for DefectDojo☆29Updated 9 months ago
- ☆45Updated 4 years ago
- Web Application Security Checklist☆133Updated 7 months ago
- Burp plugin for the 1Password session protocol for use by security researchers.☆74Updated 5 months ago
- Scans every git push to your Github organisations to find unwanted secrets.☆87Updated 6 months ago
- ☆38Updated 8 months ago
- Kenna Security API and Scripting Toolkit☆34Updated 2 months ago
- The current website at https://disclose.io.☆19Updated 9 months ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆90Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated last year
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Dependency Combobulator☆93Updated last year
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13Updated 3 years ago
- Cracking the Security Engineer Interviews☆55Updated 3 years ago
- This repo scans pypi for AWS keys☆106Updated last year
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated 2 years ago
- A checklist of practices for organizations dealing with account takeover (ATO)☆274Updated last year
- A curated list of security tools for Hackers & Builders!☆100Updated last year
- A guide on coordinated vulnerability disclosure for open source projects. Includes templates for security policies (security.md) and disc…☆130Updated this week
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- Target practice for ffuf☆69Updated 4 years ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆69Updated 3 years ago