sderosiaux / checklists
All checklists
☆26Updated 6 years ago
Alternatives and similar repositories for checklists
Users that are interested in checklists are comparing it to the libraries listed below
Sorting:
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 3 years ago
- A Collection of articles, videos, blogs, talks and other materials on Node.js Security☆27Updated 5 years ago
- Scan secrets from Continuous Integration Build Logs☆51Updated 5 years ago
- AWS Security Checks☆39Updated 7 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆17Updated 6 years ago
- A static website template for security pages.☆51Updated 8 months ago
- Reclaim control of your Burp Suite Repeater tabs with this powerful extension☆67Updated 3 years ago
- Detect exposed API keys on GitHub commits.☆34Updated 2 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Updated 5 years ago
- Manual JavaScript Linting is a Bug☆49Updated 4 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated…☆32Updated 5 years ago
- Yet Another Vulnerability Database☆16Updated 3 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Updated 2 years ago
- A list of universities with vulnerability disclosure policies☆50Updated 3 years ago
- sshchecker is a fast dedicated ssh brute-forcing tool to check ssh login on the giving IP list.☆21Updated 4 years ago
- ☆39Updated 2 years ago
- Script for monitoring changes in javascript files on WebApps for offensive reconnaissance.☆28Updated 3 years ago
- Some random scripts. Just trying to be like the cool kids.☆92Updated 6 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆39Updated 6 years ago
- An Entropy-Based Link Vulnerability Tool☆60Updated 7 years ago
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆133Updated 2 weeks ago
- A tool for fetching archived URLs (to be rewritten in Go).☆40Updated 6 years ago
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- A collective list of public JSON APIs for use in security. Contributions welcome☆25Updated 5 years ago
- Useful commands for pentesting Linux and Windows systems☆14Updated 4 years ago
- ☆12Updated 4 years ago
- Burp Suite Extension to monitor new scope☆17Updated 4 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- A tool for searching a Git repository for interesting content☆104Updated last year