jacobian / infosec-engineering
A reading list for infosec engineers
☆536Updated 6 years ago
Alternatives and similar repositories for infosec-engineering:
Users that are interested in infosec-engineering are comparing it to the libraries listed below
- A deliberately-vulnerable website and exercises for teaching about the OWASP Top 10☆185Updated 9 months ago
- Vulnerable Django Application☆204Updated 3 years ago
- Python AST-based static analyzer from OpenStack Security Group☆1,168Updated 5 years ago
- Scripts built from our Guide to User Data Security☆445Updated 8 months ago
- A curated list of computer science literature, updated daily.☆165Updated 9 years ago
- Minion☆354Updated 6 years ago
- List of crypto projects that might not suck☆423Updated 2 years ago
- Configuration to use gpg smartcards for ssh authentication☆158Updated 7 years ago
- Collection of Ansible playbooks to quickly start your Django Application☆338Updated 8 years ago
- Live at http://extractdata.club☆167Updated 8 years ago
- Distributed alerting for the masses!☆995Updated 6 years ago
- pre-commit hook for Git that checks for suspicious files.☆328Updated 8 years ago
- Scan domains and return data based on HTTPS best practices☆678Updated last month
- Architectural patterns of resilient distributed systems☆1,258Updated 7 years ago
- Achieving confident refactoring through experimentation with Python 2.7 & 3.3+☆1,272Updated last year
- Educational SSH client☆124Updated 8 years ago
- Dead simple LAMP-stack deployments for Python-powered web applications.☆416Updated 3 years ago
- A realistic password strength estimator.☆254Updated 3 years ago
- A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.☆323Updated 7 years ago
- Deployment checklist for securely deploying Docker☆603Updated 8 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- A tool to surface security issues in python code☆226Updated 7 years ago
- ☆98Updated 2 years ago
- Personal security checklist for securing your devices and accounts.☆274Updated 5 years ago
- ☆570Updated 2 years ago
- All your IPs are belong to us.☆669Updated 6 years ago
- Programming challenges for Hackers - A command line tool for all programming challenges☆289Updated 5 years ago
- Conference Talks and Proposals☆752Updated 7 years ago
- Tool used to continuously monitor a Github org for mistaken public commits☆165Updated 9 years ago
- Ops School Curriculum☆1,626Updated last year