gshaw / security-checklist
Web application security checklist
☆40Updated 8 years ago
Alternatives and similar repositories for security-checklist:
Users that are interested in security-checklist are comparing it to the libraries listed below
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆35Updated 7 years ago
- ☆27Updated 7 years ago
- A local scanner for vulnerable web applications☆38Updated this week
- A security scanner for Wordpress blogging engine☆32Updated 8 years ago
- Static website for security.txt.☆67Updated 7 months ago
- ☆30Updated 2 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- Recon system hardening scanner☆47Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆34Updated 7 years ago
- Parse HTTP Security Headers☆36Updated 5 months ago
- An Open framework to rate the exposure of ip addresses with services exposed to the internet☆30Updated 7 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆110Updated 5 years ago
- ☆56Updated 7 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- A tool for calculating necessary SQL Server permissions☆24Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 6 years ago
- A Go client for crobat☆24Updated 4 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- bash script to download publicly available .svn directories☆16Updated 7 years ago
- Git module to prevent from committing sensitive information into the repository.☆50Updated 7 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 6 years ago
- Maintain a list of tips and tricks to be used by Ubuntu users to secure their laptops.☆65Updated 5 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- Material related to my talks at various conferences on using Continuous Integration tools (Jenkins, Teamcity, Go, Hudson, CruiseControl) …☆118Updated 8 years ago
- Network Defender Toolkit☆18Updated 11 years ago
- Easy to use command line security scanner☆59Updated 8 years ago