ossf / project-template
OpenSSF Project Template
☆18Updated last year
Alternatives and similar repositories for project-template
Users that are interested in project-template are comparing it to the libraries listed below
Sorting:
- Go wrapper for awslabs/certlint☆26Updated 5 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- A tool to run a command when the target of a symlink changes☆16Updated 9 years ago
- A fast port scanner written in go with a focus on reliability and simplicity.☆16Updated 6 months ago
- CA Issuers Monitor (Authority Info Access)☆13Updated 2 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- Go wrapper for kroeckx/x509lint☆14Updated 3 years ago
- OCSP Responder monitor☆35Updated 9 months ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- How Enable Security handles security vulnerabilities☆11Updated 3 weeks ago
- OWASP Foundation Web Respository☆10Updated 2 years ago
- Create an AMI with CobaltStrike and related tools.☆10Updated last month
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Simplified NAT Slipstream server and client☆21Updated 4 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 3 months ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Guidelines for Security Disclosures☆25Updated 6 years ago
- Tips to protect your personal and company data☆28Updated 5 years ago
- Checklists☆16Updated 8 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated 2 months ago
- Scan products in your stack for known vulnerabilities☆11Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- DLT-Security-Framework☆18Updated 4 years ago