mostafahussein / awesome-security-checklistLinks
If you're launching a new application and have security in mind, this is a good starting point
☆108Updated 9 years ago
Alternatives and similar repositories for awesome-security-checklist
Users that are interested in awesome-security-checklist are comparing it to the libraries listed below
Sorting:
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆75Updated 7 years ago
- Trailbot tracks files and logs in your servers and triggers Smart Policies upon unwanted modification.☆138Updated 9 years ago
- A Shell Script To Take Care Of Ubuntu Basics☆143Updated 4 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- Personal security checklist for securing your devices and accounts.☆277Updated 6 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- Code for installing various security minded tools onto Vagrant powered virtual machines☆172Updated 11 years ago
- Puzzles, challenges, games, CTFs, and other entertainment via coding☆203Updated 4 years ago
- Check UNIX/Linux systems for privilege escalation☆125Updated 9 years ago
- Vulnerable Web applications Generator☆84Updated 8 years ago
- A checklist of important security issues you should consider when creating a web application.☆421Updated 4 years ago
- A fast way to scan your server for outdated software and potential exploits.☆379Updated last year
- A Github organization reconnaissance tool.☆219Updated 2 years ago
- A Linux shell script to improve your privacy online☆86Updated 9 years ago
- replaces fish history with a history tailored to pentesters for efficency and newbie pentesters for learning. this is also useful for beg…☆53Updated 9 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- ☆78Updated 10 years ago
- OpenDNS application security training program☆231Updated 4 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆143Updated 7 years ago
- ☆84Updated 3 years ago
- Overview Tooling Process Physical People☆48Updated last month
- Local Privilege Escalation☆209Updated 8 years ago
- Capture the Flag: Web Edition https://stripe.com/blog/capture-the-flag-20☆278Updated 10 years ago
- A list of publicly known but unfixed security bugs☆237Updated 7 years ago
- Db Database Assessment Tool☆212Updated 7 years ago
- Docker images for infosec tools☆156Updated 8 years ago
- Hunt for vulnerable websites as you browse.☆132Updated 8 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆602Updated 3 years ago
- Cyber Security Base with F-Secure☆52Updated 6 years ago
- Shell Script I Use To Automatically Clean Up My Mac.☆266Updated 7 years ago