mostafahussein / awesome-security-checklistLinks
If you're launching a new application and have security in mind, this is a good starting point
☆106Updated 9 years ago
Alternatives and similar repositories for awesome-security-checklist
Users that are interested in awesome-security-checklist are comparing it to the libraries listed below
Sorting:
- replaces fish history with a history tailored to pentesters for efficency and newbie pentesters for learning. this is also useful for beg…☆51Updated 8 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆140Updated 3 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆100Updated 8 years ago
- ☆78Updated 9 years ago
- Overview Tooling Process Physical People☆46Updated 4 years ago
- Check UNIX/Linux systems for privilege escalation☆124Updated 9 years ago
- Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong t…☆99Updated 6 years ago
- Build your own private VPN server. OpenVPN, Scramblesuit and DNS up in less then 5 minutes☆78Updated 6 years ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- A collection of Ansible roles for automating infosec builds.☆93Updated 7 years ago
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowd☆192Updated 9 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆74Updated 6 years ago
- Trailbot tracks files and logs in your servers and triggers Smart Policies upon unwanted modification.☆139Updated 8 years ago
- A service for monitoring whether chat apps etc. leak URLs☆56Updated 6 years ago
- Local Privilege Escalation☆207Updated 8 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆142Updated 6 years ago
- A Github organization reconnaissance tool.☆219Updated 2 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- Personal security checklist for securing your devices and accounts.☆274Updated 5 years ago
- A list of publicly known but unfixed security bugs☆237Updated 7 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆127Updated 8 years ago
- A list of security blogs.☆57Updated 6 years ago
- A webshell framework for penetration testers.☆298Updated last year
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- Docker container for OWASP Mutillidae II Web Pen-Test Practice Application☆70Updated 3 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 8 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆119Updated 2 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Updated 8 years ago