securitytxt / securitytxt.org
Static website for security.txt.
☆64Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for securitytxt.org
- A static website template for security pages.☆50Updated 2 months ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆67Updated 4 years ago
- Learn the basics of cryptography throughout history.☆19Updated 3 years ago
- CLI tools using Harpoon features☆21Updated last year
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last year
- An Entropy-Based Link Vulnerability Tool☆60Updated 6 years ago
- Scan all possible TLD's for a given domain name☆82Updated 3 years ago
- Some random scripts. Just trying to be like the cool kids.☆90Updated 6 years ago
- Generate a personal Jekyll website using your Bibtex references.☆10Updated 5 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Updated 5 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆36Updated 6 years ago
- A tool for enumerating expired domains in CNAME records☆58Updated 8 years ago
- A list of universities with vulnerability disclosure policies☆48Updated 3 years ago
- Reconnaissance tool for GitLab and GitHub organizations☆49Updated 11 months ago
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆14Updated 8 years ago
- Simple golang shodan cli☆48Updated 3 years ago
- ☆18Updated 4 years ago
- A security.txt parser for PHP☆12Updated 7 years ago
- ☆22Updated 2 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 4 years ago
- Scans crossdomain.xml policies for expired domain names.☆25Updated 9 years ago
- A tool to evaluate Content Security Policies.☆71Updated 4 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- A fast http and https prober, to check which URLs are alive☆69Updated 5 years ago
- A formula to calculate bounty amounts.☆13Updated 6 years ago
- ☆34Updated 4 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago
- Amazon S3 bucket spelunking!☆84Updated 7 years ago
- Lightweight and extensible horizontal vulnerability scanner☆11Updated last year