mostafahussein / awesome-security-checklistLinks
If you're launching a new application and have security in mind, this is a good starting point
☆107Updated 9 years ago
Alternatives and similar repositories for awesome-security-checklist
Users that are interested in awesome-security-checklist are comparing it to the libraries listed below
Sorting:
- Trailbot tracks files and logs in your servers and triggers Smart Policies upon unwanted modification.☆139Updated 8 years ago
- replaces fish history with a history tailored to pentesters for efficency and newbie pentesters for learning. this is also useful for beg…☆51Updated 9 years ago
- A Github organization reconnaissance tool.☆219Updated 2 years ago
- Puzzles, challenges, games, CTFs, and other entertainment via coding☆203Updated 4 years ago
- ☆78Updated 9 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆127Updated 8 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- A checklist of important security issues you should consider when creating a web application.☆420Updated 4 years ago
- Check UNIX/Linux systems for privilege escalation☆125Updated 9 years ago
- Local Privilege Escalation☆207Updated 8 years ago
- OpenDNS application security training program☆230Updated 4 years ago
- A Linux shell script to improve your privacy online☆84Updated 9 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆74Updated 6 years ago
- A Shell Script To Take Care Of Ubuntu Basics☆142Updated 4 years ago
- A collection of Ansible roles for automating infosec builds.☆93Updated 7 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆263Updated 7 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆142Updated 7 years ago
- A webshell framework for penetration testers.☆298Updated last year
- Automated WiFi limit evasion☆118Updated 8 years ago
- Detect silent (unwanted) changes to files on your system☆162Updated 5 years ago
- Personal security checklist for securing your devices and accounts.☆276Updated 5 years ago
- Db Database Assessment Tool☆210Updated 7 years ago
- A fast way to scan your server for outdated software and potential exploits.☆379Updated last year
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- Resources for developers and security engineers to learn the ropes of application security☆97Updated 6 years ago
- ☆83Updated 2 years ago
- Build your own private VPN server. OpenVPN, Scramblesuit and DNS up in less then 5 minutes☆78Updated 6 years ago
- Docker images for infosec tools☆158Updated 8 years ago
- Capture the Flag: Web Edition https://stripe.com/blog/capture-the-flag-20☆276Updated 9 years ago