All Projects → Ecommerce Website Security Checklist → Similar Projects or Alternatives

1027 Open source projects that are alternatives of or similar to Ecommerce Website Security Checklist

Awesome Hacking Lists
平常看到好的渗透hacking工具和多领域效率工具的集合
Stars: ✭ 311 (+217.35%)
Mutual labels:  hacking, hacker, bug-bounty
Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+1315.31%)
Mutual labels:  hacking, hacker, bug-bounty
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+10564.29%)
Mutual labels:  hacking, hacker
Zbn
安全编排与自动化响应平台
Stars: ✭ 201 (+105.1%)
Mutual labels:  hacking, hacker
Awesome Hacking Lists
Project transferred to: https://github.com/taielab/awesome-hacking-lists
Stars: ✭ 203 (+107.14%)
Mutual labels:  hacking, hacker
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+419.39%)
Mutual labels:  hacking, bug-bounty
Awesome Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+48918.37%)
Mutual labels:  hacking, bug-bounty
Redteam Hardware Toolkit
🔺 Red Team Hardware Toolkit 🔺
Stars: ✭ 163 (+66.33%)
Mutual labels:  hacking, hacker
Cehv10 Notes
📕 Both personal and public notes for EC-Council's CEHv10 312-50, because its thousands of pages/slides of boredom, and a braindump to many
Stars: ✭ 170 (+73.47%)
Mutual labels:  hacking, hacker
Quack
Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (+211.22%)
Mutual labels:  hacking, hacker
W5
Security Orchestration, Automation and Response (SOAR) Platform. 安全编排与自动化响应平台,无需编写代码的安全自动化,使用 SOAR 可以让团队工作更加高效
Stars: ✭ 367 (+274.49%)
Mutual labels:  hacking, hacker
Brutesploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (+332.65%)
Mutual labels:  hacking, hacker
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+321.43%)
Mutual labels:  hacking, hacker
Hfish
安全、可靠、简单、免费的企业级蜜罐
Stars: ✭ 2,977 (+2937.76%)
Mutual labels:  hacking, hacker
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (+3.06%)
Mutual labels:  hacking, bug-bounty
Hackingtool
ALL IN ONE Hacking Tool For Hackers
Stars: ✭ 7,521 (+7574.49%)
Mutual labels:  hacking, hacker
Oxidtools
200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (+45.92%)
Mutual labels:  hacking, hacker
Hackercamp
Enine boyuna siber güvenlik
Stars: ✭ 149 (+52.04%)
Mutual labels:  hacking, hacker
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (+93.88%)
Mutual labels:  hacking, bug-bounty
Goaltdns
A permutation generation tool written in golang
Stars: ✭ 119 (+21.43%)
Mutual labels:  hacking, bug-bounty
Blackworm
Black Worm Offical Repo
Stars: ✭ 80 (-18.37%)
Mutual labels:  hacking, hacker
Blacknet
Free advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (+176.53%)
Mutual labels:  hacking, hacker
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+234.69%)
Mutual labels:  hacking, bug-bounty
Richkware
Framework for building Windows malware, written in C++
Stars: ✭ 315 (+221.43%)
Mutual labels:  hacking, hacker
Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+591.84%)
Mutual labels:  hacking, hacker
Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+613.27%)
Mutual labels:  hacking, bug-bounty
Resources For Beginner Bug Bounty Hunters
A list of resources for those interested in getting started in bug bounties
Stars: ✭ 7,185 (+7231.63%)
Mutual labels:  hacking, bug-bounty
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (+174.49%)
Mutual labels:  hacking, bug-bounty
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+7293.88%)
Mutual labels:  hacking, bug-bounty
Icg Autoexploiterbot
Wordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (+146.94%)
Mutual labels:  hacking, hacker
Instainsane
Multi-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (+384.69%)
Mutual labels:  hacking, hacker
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-45.92%)
Mutual labels:  hacking, bug-bounty
Bash scripting
bash scripting thing !
Stars: ✭ 118 (+20.41%)
Mutual labels:  hacking, bug-bounty
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+210.2%)
Mutual labels:  hacking, bug-bounty
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (+28.57%)
Mutual labels:  hacking, hacker
Pidrila
Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (+27.55%)
Mutual labels:  hacking, bug-bounty
Di.we.h
Repositório com conteúdo sobre web hacking em português
Stars: ✭ 156 (+59.18%)
Mutual labels:  hacking, bug-bounty
M3m0
M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (+26.53%)
Mutual labels:  hacking, hacker
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+89.8%)
Mutual labels:  hacking, hacker
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+2706.12%)
Mutual labels:  hacking, hacker
Hawkeye
Hawkeye filesystem analysis tool
Stars: ✭ 202 (+106.12%)
Mutual labels:  hacking, bug-bounty
Thechoice
The linux choice collection tools
Stars: ✭ 245 (+150%)
Mutual labels:  hacking, hacker
Dumpall
一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (+155.1%)
Mutual labels:  hacking, bug-bounty
Phonia
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (+125.51%)
Mutual labels:  hacking, hacker
Wahh extras
The Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (+336.73%)
Mutual labels:  hacking, hacker
Dracnmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+778.57%)
Mutual labels:  hacking, hacker
Whitehat
Information about my experiences on ethical hacking 💀
Stars: ✭ 54 (-44.9%)
Mutual labels:  hacking, hacker
Blackrat
BlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-11.22%)
Mutual labels:  hacking
Scm Biz Suite
供应链中台系统基础版,集成零售管理, 电子商务, 供应链管理, 财务管理, 车队管理, 仓库管理, 人员管理, 产品管理, 订单管理, 会员管理, 连锁店管理, 加盟管理, 前端React/Ant Design, 后端Java Spring+自有开源框架,全面支持MySQL, PostgreSQL, 全面支持国产数据库南大通用GBase 8s,通过REST接口调用,前后端完全分离。
Stars: ✭ 1,310 (+1236.73%)
Mutual labels:  ecommerce
Cve 2019 0708 Tool
A social experiment
Stars: ✭ 87 (-11.22%)
Mutual labels:  hacking
Hookso
linux动态链接库的注入修改查找工具 A tool for injection, modification and search of linux dynamic link library
Stars: ✭ 87 (-11.22%)
Mutual labels:  hacking
Python Ransomware
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-2.04%)
Mutual labels:  hacking
Stretcher
Tool designed to help identify open Elasticsearch servers that are exposing sensitive information
Stars: ✭ 91 (-7.14%)
Mutual labels:  hacking
Platform
Shopware 6 is an open source eCommerce platform realised by the ideas and the spirit of its community.
Stars: ✭ 1,267 (+1192.86%)
Mutual labels:  ecommerce
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+1193.88%)
Mutual labels:  hacking
Gatsby Demo Store
Elastic Path + Gatsby powered online store
Stars: ✭ 91 (-7.14%)
Mutual labels:  ecommerce
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-12.24%)
Mutual labels:  hacking
Tools
Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+1270.41%)
Mutual labels:  hacking
Github Dorks
Find leaked secrets via github search
Stars: ✭ 1,332 (+1259.18%)
Mutual labels:  hacking
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+1184.69%)
Mutual labels:  hacking
1-60 of 1027 similar projects