Repository of Hardening Guides
☆628Feb 11, 2026Updated last month
Alternatives and similar repositories for hardening
Users that are interested in hardening are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to scrape LinkedIn☆98Mar 20, 2017Updated 9 years ago
- Taktiksel Bug Hunting Yöntemleri☆47Apr 28, 2017Updated 8 years ago
- Finds all public bug reports on reported on Hackerone☆98Dec 13, 2015Updated 10 years ago
- A collection of web pages, vulnerable to command injection flaws☆182Mar 5, 2023Updated 3 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- ☆13Jul 19, 2017Updated 8 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆13Jul 20, 2017Updated 8 years ago
- See the history of a file from above☆17Aug 1, 2017Updated 8 years ago
- Hello and welcome to my GitHub account. If you'd like to know more about me, this is likely the best place to start☆16Oct 4, 2017Updated 8 years ago
- Verify the configuration of your OS X machine.☆1,242Feb 19, 2019Updated 7 years ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,787Jan 7, 2020Updated 6 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- A script for credentials-based attack surface enumeration and general reconnaissance of massive networks☆473Mar 2, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Combines the speed of masscan with the reliability and detailed enumeration of nmap☆17Aug 16, 2017Updated 8 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,508Jan 12, 2026Updated 2 months ago
- Community guide to securing and improving privacy on macOS.☆22,498Jan 2, 2026Updated 2 months ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆500Aug 11, 2017Updated 8 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bucrowd LevelUp 2017 virtua…☆25Jul 15, 2017Updated 8 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Chrome Extension for XSS Hunter Payloads☆14Sep 7, 2016Updated 9 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆16Mar 17, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆19Jun 2, 2017Updated 8 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids.☆33Jul 1, 2018Updated 7 years ago
- A forensic evidence collection & analysis toolkit for OS X☆1,891Jun 19, 2019Updated 6 years ago
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆700Aug 9, 2023Updated 2 years ago
- A static website template for security pages.☆19Jun 29, 2018Updated 7 years ago
- ☆614Oct 4, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Sep 14, 2020Updated 5 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,237Nov 20, 2025Updated 4 months ago