Open-source vulnerability disclosure policy templates.
☆68Feb 9, 2026Updated 2 months ago
Alternatives and similar repositories for dioterms
Users that are interested in dioterms are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆34Mar 20, 2026Updated 3 weeks ago
- The current website at https://disclose.io.☆19Apr 4, 2026Updated last week
- A free, open-source, multi-lingual, template-based VDP policy, safe harbor clause, securitytxt, and DNS Security TXT generator.☆16Mar 28, 2026Updated 2 weeks ago
- Open-source vulnerability disclosure and bug bounty program database☆1,055Mar 28, 2026Updated 2 weeks ago
- Tools, data, and contact lists relevant to The disclose.io Project.☆326Mar 20, 2026Updated 3 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆26Oct 3, 2024Updated last year
- ☆27Aug 18, 2023Updated 2 years ago
- ☆18Oct 20, 2022Updated 3 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Scripts to better manage a WireGuard server☆11Jan 31, 2024Updated 2 years ago
- Vulnerability disclosure policies in the US Government's executive branch☆39Mar 28, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆11Aug 25, 2018Updated 7 years ago
- Firefox extension to list the hosts, and corresponding IPs, from which a page and its resources are loaded.☆19Jan 4, 2015Updated 11 years ago
- A client and library to cve-services 2.x to provide CVE management for CNA and CERTs☆30Apr 8, 2026Updated last week
- The Authentic Software Guard☆13Dec 20, 2015Updated 10 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆322Mar 27, 2026Updated 2 weeks ago
- dEX is a powerful tool for transmitting OS command output over DNS. It is equipped with robust mechanisms for handling missing chunks, en…☆18Nov 21, 2024Updated last year
- basic bbtools , buggy , not recommended to use☆35Jan 22, 2025Updated last year
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆27Nov 11, 2020Updated 5 years ago
- Javascript file change monitoring☆17Mar 13, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code samples for Query relational data in Azure☆17Jun 10, 2020Updated 5 years ago
- JavaScript component to parse, clean, remove formatting (unformat) numbers in strings.☆10Dec 5, 2024Updated last year
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- A (micro) service that generates large amounts of fake data (users, json, yaml, ecommerce ...)☆17Dec 6, 2018Updated 7 years ago
- A powerful tool designed for identifying hidden endpoints and sensitive information within JavaScript files on a website.☆30Mar 31, 2026Updated 2 weeks ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- Monitor Unused IAM Roles 🎓☆13Apr 30, 2021Updated 4 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Automated contract template in LaTeX that includes fill-in-the-blank fields, conditional clauses, and automatic paragraph numbering.☆29Aug 20, 2013Updated 12 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 4 years ago
- Robot framework used by Team 401☆10Mar 2, 2020Updated 6 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- AWS KMS Encryption & Decyption using CLI & Lambda☆10Apr 12, 2021Updated 5 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 months ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago