kristovatlas / github-security-checklist
A list of important security checks for GitHub individual and organization accounts
☆14Updated 7 years ago
Alternatives and similar repositories for github-security-checklist:
Users that are interested in github-security-checklist are comparing it to the libraries listed below
- a collection of teaching resources☆12Updated 7 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- A tool to run a command when the target of a symlink changes☆16Updated 8 years ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆13Updated 8 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆14Updated 9 years ago
- Advice on how to do computer things securely for non-experts☆59Updated 4 years ago
- Tips to protect your personal and company data☆28Updated 4 years ago
- Detect whether an IP address belongs to a Tor exit node.☆22Updated 2 years ago
- Install your remote server for the Lamassu Cryptomat☆18Updated 2 weeks ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- an attempt to create a universal basic set of presentation slides to help teach basic concepts at Cryptoparties.☆18Updated 10 years ago
- A static website template for security pages.☆50Updated 7 months ago
- Network white noise collector☆18Updated 9 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated 2 years ago
- Simple file sharing over tor hidden services (v3)☆28Updated 5 years ago
- A collection of (not-so, yet) awesome resources related to TLS, PKI and related stuff☆40Updated 2 years ago
- Spark MLib Training Models for Network Security☆16Updated 7 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Updated 4 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 5 years ago
- Recover Monero address using the private spend key☆11Updated 8 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago
- Hex encode & decode a string, right from your terminal.☆11Updated 2 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 7 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A forensic system baselining, searching, and evidence collection tool☆16Updated 5 years ago