mostafahussein / awesome-security-checklist
If you're launching a new application and have security in mind, this is a good starting point
☆106Updated 9 years ago
Alternatives and similar repositories for awesome-security-checklist:
Users that are interested in awesome-security-checklist are comparing it to the libraries listed below
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆74Updated 6 years ago
- Local Privilege Escalation☆207Updated 8 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- replaces fish history with a history tailored to pentesters for efficency and newbie pentesters for learning. this is also useful for beg…☆51Updated 8 years ago
- ☆78Updated 9 years ago
- Check UNIX/Linux systems for privilege escalation☆124Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- A collection of Ansible roles for automating infosec builds.☆93Updated 7 years ago
- ☆83Updated 2 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆139Updated 3 years ago
- Docker container for OWASP Mutillidae II Web Pen-Test Practice Application☆70Updated 3 years ago
- Resources for developers and security engineers to learn the ropes of application security☆97Updated 6 years ago
- Capture the Flag: Web Edition https://stripe.com/blog/capture-the-flag-20☆276Updated 9 years ago
- A webshell framework for penetration testers.☆297Updated last year
- Trailbot tracks files and logs in your servers and triggers Smart Policies upon unwanted modification.☆139Updated 8 years ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- Cartero - Social Engineering Framework☆171Updated 4 years ago
- List of web application security☆165Updated 8 years ago
- A checklist of important security issues you should consider when creating a web application.☆421Updated 3 years ago
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowd☆191Updated 9 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago
- Various Tools and Docker Images☆280Updated 6 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆142Updated 6 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Updated 8 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- Just a copy-paste XSS test file☆23Updated 12 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Updated 7 years ago