You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because someone fell for a phishing email and wired money to a scammer, while another user inadvertently downloaded and installed malware from an email link that opened a backdoor into the network. Email is as importa…
☆15Mar 6, 2017Updated 9 years ago
Alternatives and similar repositories for Email-Security-Checklist
Users that are interested in Email-Security-Checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆14Mar 18, 2026Updated last week
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- A list of OpenStack Security Best Practices - written in Markdown☆10Apr 8, 2015Updated 10 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- A cargo subcommand to build Rust with docker☆19Aug 24, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆13Oct 16, 2025Updated 5 months ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- 🏣 Amazon Web 🏪 Services through 🕍 hands-on 🏘 projects real 🚂 world use cases 🚋 and guided 🚒 tutorials Perfect 🚜 developers ⛸ Dev …☆31May 11, 2025Updated 10 months ago
- Checkpoint 401 Forward Auth Security Server.☆17Jun 13, 2024Updated last year
- A console tool for inspecting Windows Ancillary Function Driver sockets☆21May 15, 2025Updated 10 months ago
- Check Safety of SSH Public Keys☆12Oct 8, 2022Updated 3 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- AWS multi-account setup via IAC, with scripts for bootstrapping and custom usage☆17Mar 1, 2026Updated 3 weeks ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Google dorks for bug bounty hunting☆12Jul 28, 2021Updated 4 years ago
- Elf checksec in Go.☆14May 10, 2022Updated 3 years ago
- Checking for leaked passwords through haveibeenpwned v2 API using the hash-range checker☆12Feb 7, 2024Updated 2 years ago
- Implementation of mod_security rules and Apache best practices for CentOS 5,6,7☆15May 4, 2017Updated 8 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- Baseline, check and correct your SQL Database Security☆12Mar 9, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Android application for checking security level of DRM and HDCP☆11Jan 23, 2023Updated 3 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Http Security Headers Checker Tool written in PHP Cli + Useful Tips to set Http Security Headers☆10Mar 27, 2021Updated 5 years ago
- Provides information if your SilverStripe application uses dependencies with known vulnerabilities.☆10Jun 21, 2023Updated 2 years ago
- Jam3 quality advisor. Integrates checking for best practices at Jam3☆12Apr 21, 2023Updated 2 years ago
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 9 years ago
- Manage and maintain Defender XDR custom collection configuration☆34Nov 19, 2025Updated 4 months ago
- 💾 Bash oneliners and terminal tricks☆22Nov 24, 2022Updated 3 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Django password validator that checks for passwords in known data breaches.☆15Feb 6, 2019Updated 7 years ago
- ARCHIVED - Tool to perform security check on dependencies embedded in given Go binary☆11Nov 26, 2024Updated last year
- This is a CLI tool to check a csv of email addresses and user names in https://haveibeenpwned.com☆13Jul 13, 2018Updated 7 years ago
- NuLink network is a decentralized solution for privacy-preserving applications developers to implement best practices and best of breed s…☆13Oct 30, 2024Updated last year
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Jul 1, 2021Updated 4 years ago
- github action to run the bandit security linter☆15Feb 26, 2026Updated last month
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago