You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because someone fell for a phishing email and wired money to a scammer, while another user inadvertently downloaded and installed malware from an email link that opened a backdoor into the network. Email is as importa…
☆15Mar 6, 2017Updated 9 years ago
Alternatives and similar repositories for Email-Security-Checklist
Users that are interested in Email-Security-Checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sample terraform repo with multiple resources and a workflow that uses tools to automate cost management, security checks, best practices…☆10Jun 24, 2021Updated 4 years ago
- A checklist for defending private or corporate networks.☆17Jan 1, 2020Updated 6 years ago
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆15Mar 18, 2026Updated 3 weeks ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- A list of OpenStack Security Best Practices - written in Markdown☆10Apr 8, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- 📦 Shango Deploy | Modern deployment automation tool that simplifies deploying web applications with zero configuration. Supports multipl…☆12Feb 26, 2025Updated last year
- The JetRails 2FA plugin adds an extra layer of security to your Magento store. User based 2FA enablement ensures that admin users are fo…☆11Oct 12, 2024Updated last year
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆13Oct 16, 2025Updated 5 months ago
- A Gradle plugin for checking whether an .apk or an .aar contains OpenSSL versions with known vulnerabilities☆13Nov 28, 2016Updated 9 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- 🏣 Amazon Web 🏪 Services through 🕍 hands-on 🏘 projects real 🚂 world use cases 🚋 and guided 🚒 tutorials Perfect 🚜 developers ⛸ Dev …☆31May 11, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Checkpoint 401 Forward Auth Security Server.☆17Jun 13, 2024Updated last year
- A console tool for inspecting Windows Ancillary Function Driver sockets☆21May 15, 2025Updated 11 months ago
- Check Safety of SSH Public Keys☆12Oct 8, 2022Updated 3 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆16Jul 6, 2014Updated 11 years ago
- Ansible playbook for setting up a secure and private homelab with multiple machines, following ansible-lint best practices and implementi…☆14Jun 16, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Elf checksec in Go.☆14May 10, 2022Updated 3 years ago
- Simple Azure AI Studio setup following Microsoft's best practices for security and access management☆17Sep 27, 2024Updated last year
- A collection of Docker resources, including comprehensive tools and best practices for container management, monitoring, security, automa…☆17May 30, 2025Updated 10 months ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- Mach-O file format reader, written entirely in Swift☆13May 10, 2020Updated 5 years ago
- DumpStrings programmatically extracts strings from Mach-O (macOS), ELF (Linux), and PE (Windows) binary formats by parsing their string-c…☆17Mar 14, 2026Updated last month
- Baseline, check and correct your SQL Database Security☆12Mar 9, 2022Updated 4 years ago
- Incident Response automation scripts☆16Sep 5, 2025Updated 7 months ago
- Android application for checking security level of DRM and HDCP☆11Jan 23, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago
- Http Security Headers Checker Tool written in PHP Cli + Useful Tips to set Http Security Headers☆10Mar 27, 2021Updated 5 years ago
- Jam3 quality advisor. Integrates checking for best practices at Jam3☆12Apr 21, 2023Updated 2 years ago
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 10 years ago
- C rewrite of a minimal Python JPEG decoder☆12Jan 2, 2019Updated 7 years ago
- Django password validator that checks for passwords in known data breaches.☆15Feb 6, 2019Updated 7 years ago
- ARCHIVED - Tool to perform security check on dependencies embedded in given Go binary☆11Nov 26, 2024Updated last year