tg12 / SecurityHeaders_GovUK
A scan of all .gov.uk sites for the most common security headers or lack of
☆15Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for SecurityHeaders_GovUK
- The SSH Multiplex Backdoor Tool☆62Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Minimalistic DNS logging tool☆43Updated 2 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Generate pentest reports based on github issues.☆17Updated last year
- DNS server limitation mapper☆25Updated 6 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 6 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- dev level ;-)☆10Updated 5 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆18Updated last year
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- ☆13Updated 7 years ago
- SWF Vulnerability & Information Scanner☆19Updated 5 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- Tool to recursively download versioned source code from .svn directories (pre Subversion-1.7 "WC-NG" format)☆8Updated 9 years ago
- Code snippets from my blog☆25Updated 2 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- Get detailed information about a Twitter user activity☆17Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago