kristovatlas / github-security-checklist
A list of important security checks for GitHub individual and organization accounts
☆15Updated 7 years ago
Alternatives and similar repositories for github-security-checklist:
Users that are interested in github-security-checklist are comparing it to the libraries listed below
- Advice on how to do computer things securely for non-experts☆61Updated 4 years ago
- Tips to protect your personal and company data☆27Updated 4 years ago
- Hex encode & decode a string, right from your terminal.☆12Updated 2 years ago
- a collection of teaching resources☆12Updated 6 years ago
- Install your remote server for the Lamassu Cryptomat☆18Updated 2 months ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆13Updated 8 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆12Updated 2 years ago
- Tools and libraries for interacting with the Netograph API☆43Updated last year
- Websockets Server Gateway for wallets☆25Updated 9 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- Network white noise collector☆18Updated 8 years ago
- OpenSSF Project Template☆17Updated last year
- Spark MLib Training Models for Network Security☆16Updated 6 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- A forensic system baselining, searching, and evidence collection tool☆16Updated 5 years ago
- A collection of (not-so, yet) awesome resources related to TLS, PKI and related stuff☆40Updated 2 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- Guidelines for Security Disclosures☆25Updated 5 years ago
- Recover Monero address using the private spend key☆11Updated 8 years ago
- Generic cracker example which is compatible with Hashtopolis☆22Updated 3 years ago
- all things awesome security☆12Updated 9 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Configuration templates for common network security platforms. YMMV.☆22Updated last year
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago
- Detect whether an IP address belongs to a Tor exit node.☆24Updated 2 years ago
- A website outlining my bounty hunt game.☆11Updated 5 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last year
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- Republish your node project's dependencies to IPFS as a micro-registry☆11Updated 5 years ago