Repository of Hardening Guides
☆633Feb 11, 2026Updated 2 months ago
Alternatives and similar repositories for hardening
Users that are interested in hardening are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to scrape LinkedIn☆98Mar 20, 2017Updated 9 years ago
- Taktiksel Bug Hunting Yöntemleri☆47Apr 28, 2017Updated 8 years ago
- Finds all public bug reports on reported on Hackerone☆98Dec 13, 2015Updated 10 years ago
- A collection of web pages, vulnerable to command injection flaws☆182Mar 5, 2023Updated 3 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- ☆13Jul 19, 2017Updated 8 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆13Jul 20, 2017Updated 8 years ago
- See the history of a file from above☆17Aug 1, 2017Updated 8 years ago
- Hello and welcome to my GitHub account. If you'd like to know more about me, this is likely the best place to start☆16Oct 4, 2017Updated 8 years ago
- Verify the configuration of your OS X machine.☆1,241Feb 19, 2019Updated 7 years ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,790Jan 7, 2020Updated 6 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- A script for credentials-based attack surface enumeration and general reconnaissance of massive networks☆474Mar 2, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Combines the speed of masscan with the reliability and detailed enumeration of nmap☆17Aug 16, 2017Updated 8 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,534Jan 12, 2026Updated 3 months ago
- Universal Serial aBUSe is a project to demonstrate the risks of hardware bypasses of software security by Rogan Dawes at SensePost.☆501Aug 11, 2017Updated 8 years ago
- Community guide to securing and improving privacy on macOS.☆22,405Jan 2, 2026Updated 3 months ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bucrowd LevelUp 2017 virtua…☆25Jul 15, 2017Updated 8 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- Chrome Extension for XSS Hunter Payloads☆14Sep 7, 2016Updated 9 years ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆16Mar 17, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆19Jun 2, 2017Updated 8 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids.☆33Jul 1, 2018Updated 7 years ago
- A forensic evidence collection & analysis toolkit for OS X☆1,892Jun 19, 2019Updated 6 years ago
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆824Nov 3, 2017Updated 8 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆700Aug 9, 2023Updated 2 years ago
- A static website template for security pages.☆19Jun 29, 2018Updated 7 years ago
- ☆614Oct 4, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,021Sep 11, 2017Updated 8 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 9 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,268Nov 20, 2025Updated 4 months ago