A checklist of items to check, especially when inheriting a foreign network.
☆29Mar 6, 2019Updated 7 years ago
Alternatives and similar repositories for NetworkHealthChecklist
Users that are interested in NetworkHealthChecklist are comparing it to the libraries listed below
Sorting:
- Tool to automate corporate network segmentation test☆21Aug 6, 2020Updated 5 years ago
- Manage and maintain Defender XDR custom collection configuration☆34Nov 19, 2025Updated 4 months ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Aug 14, 2015Updated 10 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- Lua for SQLite☆12Jun 24, 2022Updated 3 years ago
- Backup script to automatically backup configurations from multiple HP Procurve Switches☆14Jun 7, 2020Updated 5 years ago
- Map (JSON) for emoji annotation to unicode generated via GitHub API.☆12Apr 9, 2017Updated 8 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- Parse RAML and configure Hapi routes automatically☆17May 4, 2020Updated 5 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- Analyze and visualize gzip / deflate binary on web☆20Dec 30, 2023Updated 2 years ago
- ☆10May 1, 2020Updated 5 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- Detailed discussion of Zygote vulnerability CVE-2024-31317☆21Aug 5, 2025Updated 7 months ago
- ☆14Nov 15, 2020Updated 5 years ago
- detailed description on what the system user (in its SELinux context) can access☆21Aug 12, 2025Updated 7 months ago
- A checklist for defending private or corporate networks.☆17Jan 1, 2020Updated 6 years ago
- Webserver for running a software store☆17Jun 29, 2021Updated 4 years ago
- Learn basic crypto in 2 hours☆16Nov 25, 2021Updated 4 years ago
- At the end of every year I do a bit of summary of the best applications, hardware & websites I've enjoyed & depended on throughout the ye…☆34Dec 1, 2023Updated 2 years ago
- SSL Pinning bypass using frida server for Mobile Application Penetration Testing☆15Jan 6, 2021Updated 5 years ago
- Secure encryption and decryption of credentials in PowerShell with SecureString☆14Jul 31, 2020Updated 5 years ago
- Nuxtjs authentication example☆16Feb 3, 2018Updated 8 years ago
- ☆39Mar 12, 2026Updated last week
- ☆10Jun 24, 2024Updated last year
- MGY441 Bioinformatics: Virus Discovery Project☆23Dec 22, 2025Updated 3 months ago
- A component for React that renders the approximate time ago in words from a specific past date using an HTML5 time element.☆25Dec 11, 2017Updated 8 years ago
- A simple Redis pool for node using generic-pool.☆19Aug 13, 2021Updated 4 years ago
- Download content of an open bucket☆16Dec 28, 2019Updated 6 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 7 years ago
- RFC 1951 raw deflate/inflate for JavaScript☆35Dec 12, 2019Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Drivers for Brother printers, cupswrappers☆26Nov 26, 2011Updated 14 years ago