eikendev / sectxt
A library & tool for probing, parsing, and validating security.txt files as specified in RFC 9116
☆13Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for sectxt
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- crappy set of one-off scripts and tools used for reversing and vulnerability research.☆11Updated 2 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 2 years ago
- A tool to run a command when the target of a symlink changes☆15Updated 8 years ago
- WHY?☆18Updated 8 years ago
- Binary and Static Releases☆13Updated 6 months ago
- Converted the text list to binary to save space☆10Updated 2 months ago
- Prototype program to decode a video file looking for exploits/malware.☆16Updated 4 years ago
- Generate a personal Jekyll website using your Bibtex references.☆10Updated 5 years ago
- Guidelines for Security Disclosures☆25Updated 5 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- Automatic generator of YARA modules based in protocol buffers☆14Updated 2 months ago
- Open YARA scan- and search engine☆17Updated last week
- Reconstruct javascript from a sourcemap in bash☆38Updated 2 years ago
- A nasty script which hides an HTML source code in a bunches of spaces and tabs .☆18Updated 7 years ago
- SecrutiyTube Linux Assembly Exam☆10Updated 4 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last year
- Scans crossdomain.xml policies for expired domain names.☆25Updated 9 years ago
- ☆21Updated 4 months ago
- Scripts to secure and harden Mac OS X☆31Updated 3 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 5 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 6 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- ☆22Updated 10 years ago
- Simplified NAT Slipstream server and client☆20Updated 3 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 3 months ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago