souvenir
Tag cloud
Picture wall
Daily
RSS Feed
  • RSS Feed
  • Daily Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Filters

Untagged links
page 4 / 4
75 results tagged security  ✕   ✕
domsnitch https://code.google.com/p/domsnitch
23/06/2011 cluster icon
  • Zombie.js : Zombie.js is a lightweight framework for testing client-side JavaScript code in a simulated environment. No browser required.
  • PhantomJS : PhantomJS is a headless WebKit with JavaScript API. It has fast and native support for various web standards: DOM handling, CSS selector, JSON, Canvas...
  • Bandit : Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs approp...
  • sqlmap : sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of databa...
  • TruffleHog : TruffleHog is an open-source SAST (static application security testing) tool for detecting secrets in various sources. While GitHub and GitLab reposit...

A passive reconnaissance tool inside the DOM (experimental)

security javascript dom test
Wapiti http://wapiti.sourceforge.net
18/06/2011 cluster icon
  • Nikto2 : Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potent...
  • webhint : webhint is a linting tool that will help you with your site's accessibility, speed, security and more, by checking your code for best practices and co...
  • DVWA - Damn Vulnerable Web Application : Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to t...
  • Zed Attack Proxy : The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be...
  • WebScarab : WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols.

Wapiti allows you to audit the security of your web applications.

It performs "black-box" scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data.

Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.

web security software test scan
Nikto2 http://www.cirt.net/nikto2
18/06/2011 cluster icon
  • Wapiti : Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the applica...
  • Sitespeed.io : Sitespeed.io is an open source tool that helps you analyze and optimize your website speed and performance based on performance best practices. It col...
  • webhint : webhint is a linting tool that will help you with your site's accessibility, speed, security and more, by checking your code for best practices and co...
  • vicnum : A flexible web app showing vulnerabilities such as cross site scripting, sql injections, and session management issues. Helpful to IT auditors honing ...
  • Burp Suite : Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the en...

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.

web security software test
Naked Password http://www.nakedpassword.com
01/03/2011 cluster icon
  • Clipperz : Online vault and password manager that knows nothing about you and your data. Everything you submit is locally encrypted by your browser before being ...
  • Plupload - A tool for uploading files using Flash, Silverlight, Google Gears, HTML5 or Browserplus :
  • Kali Linux : Penetration Testing Linux OS containing tools to test the security of system or a network.
  • tfsec : tfsec uses static analysis of your terraform code to spot potential misconfigurations.
  • PySQLi : Python SQL injection framework

jQuery Plugin to Encourage Stronger Passwords

jquery security password
HTML Purifier http://htmlpurifier.org
20/10/2010 cluster icon
  • HTML_QuickForm2 : This PHP package provides methods to create, validate and render HTML forms.
  • JpGraph : JpGraph is an Object-Oriented Graph creating library for PHP >= 5.1 The library is completely written in PHP and ready to be used in any PHP scripts (...
  • PHPExcel : OpenXML - Create Excel2007 documents in PHP - Spreadsheet engine
  • Mockery : Mockery is a simple yet flexible PHP mock object framework for use in unit testing with PHPUnit, PHPSpec or any other testing framework. Its core goal...
  • impress.js : It's a presentation framework based on the power of CSS3 transforms and transitions in modern browsers and inspired by the idea behind prezi.com

HTML Purifier is a standards-compliant HTML filter library written in PHP. HTML Purifier will not only remove all malicious code (better known as XSS) with a thoroughly audited, secure yet permissive whitelist, it will also make sure your documents are standards compliant, something only achievable with a comprehensive knowledge of W3C's specifications.

xss security html php library
Web Application Exploits and Defenses http://google-gruyere.appspot.com
24/09/2010 cluster icon
  • CryptPad : CryptPad is the Zero Knowledge realtime collaborative editor. Encryption carried out in your web browser protects the data from the server, the cloud ...
  • SSL Server Test : This free online service performs a deep analysis of the configuration of any SSL web server on the public Internet.
  • Freebase : A community-curated database of well-known people, places, and things
  • Skipfish : Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out a recursi...
  • The Big List of Naughty Strings : The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
security knowledge tutorial
CWE/SANS Top 25 Most Dangerous Programming Errors http://cwe.mitre.org/top25/#Listing
06/04/2010 cluster icon
  • RegExr : Online Regular Expression Testing Tool
  • Mobile Web Application Best Practices : The goal of this document is to aid the development of rich and dynamic mobile Web applications. It collects the most relevant engineering practices, ...
  • My First 10 Minutes On a Server : Primer for Securing Ubuntu
  • Tech Interview Handbook : Algorithms study materials, behavioral content and tips for rocking your coding interview. Carefully curated content to help you ace your next technic...
  • The SaaS CTO Security Checklist : This is a basic checklist that all SaaS CTOs (and anyone else) can use to harden their security. Security shouldn’t feel like a chore. Select your sta...

The CWE/SANS Top 25 Most Dangerous Software Errors is a list of the most widespread and critical errors that can lead to serious vulnerabilities in software. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all.

development security reference
XSS (Cross Site Scripting) Prevention Cheat Sheet http://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet#XSS_Prevention_Rules
19/01/2010 cluster icon
  • XSS game : Warning: You are entering the XSS game area.
  • XSS Filter Evasion Cheat Sheet - OWASP : This article is focused on providing application security testing professionals with a guide to assist in Cross Site Scripting testing.
  • HTML Purifier : HTML Purifier is a standards-compliant HTML filter library written in PHP. HTML Purifier will not only remove all malicious code (better known as XSS)...
  • Bandit : Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs approp...
  • Security Headers : I built securityheaders.io after deploying security headers like CSP and HSTS to my own site. I wanted a quick and easy way to check if other sites we...

The following rules are intended to prevent all XSS in your application. While these rules do not allow absolute freedom in putting untrusted data into an HTML document, they should cover the vast majority of common use cases.

xss security
OpenDNS http://www.opendns.com
10/12/2009 cluster icon
  • namebench : namebench hunts down the fastest DNS servers available for your computer to use. namebench runs a fair and thorough benchmark using your web browser h...
  • DNS Report : The free, thorough report on the DNS for your domain
  • Wireshark : Wireshark is the world's foremost network protocol analyzer. It lets you see what's happening on your network at a microscopic level. It is the de fac...
  • DVWA - Damn Vulnerable Web Application : Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to t...
  • vicnum : A flexible web app showing vulnerabilities such as cross site scripting, sql injections, and session management issues. Helpful to IT auditors honing ...
thumbnail

The safest, smartest, fastest and most reliable DNS on the planet.

security network dns software
Clipperz http://www.clipperz.com
13/11/2009 cluster icon
  • Wapiti : Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the applica...
  • BeEF : The Browser Exploitation Framework (BeEF) is a powerful professional security tool. BeEF is pioneering techniques that provide the experienced penetra...
  • Naked Password : jQuery Plugin to Encourage Stronger Passwords
  • vicnum : A flexible web app showing vulnerabilities such as cross site scripting, sql injections, and session management issues. Helpful to IT auditors honing ...
  • Vaultier : Easy and secure password and credentials sharing across teams.

Online vault and password manager that knows nothing about you and your data.

Everything you submit is locally encrypted by your browser before being transmitted to Clipperz. The encryption key is a passphrase known only to you! It is impossible for anyone without that key to decrypt your data.

password security online storage software
SQL Injection Cheat Sheet http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/
19/12/2008 cluster icon
  • DVWA - Damn Vulnerable Web Application : Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to t...
  • WWW SQL Designer : WWW SQL Designer allows users to create database designs, which can be saved/loaded and exported to SQL scripts. Various databases and languages are s...
  • OWASP : The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software.
  • Security Guide for Developers : A practical security guide for web developers.
  • Run your own identity server : Running your own identity server allows you to act as an OpenID Provider. You could run one just for yourself, for a community of users or, if you wis...

Samples are provided to allow reader to get basic idea of a potential SQL Injection attack and almost every section includes a brief information about itself.

web reference mysql security php
Run your own identity server http://wiki.openid.net/w/page/12995226/Run%20your%20own%20identity%20server
08/12/2008 cluster icon
  • My First 10 Minutes On a Server : Primer for Securing Ubuntu
  • 2016 Guide to User Data Security : This guide is for the software developer, architect or system administrator who doesn't want to spend a lifetime wading through cryptographic algorith...
  • Security Guide for Developers : A practical security guide for web developers.
  • Everything you need to know about HTTP security headers : This article explains what secure headers are and how to implement these headers in Rails, Django, Express.js, Go, Nginx, and Apache.
  • The SaaS CTO Security Checklist : This is a basic checklist that all SaaS CTOs (and anyone else) can use to harden their security. Security shouldn’t feel like a chore. Select your sta...

Running your own identity server allows you to act as an OpenID Provider. You could run one just for yourself, for a community of users or, if you wish, for the general public.

openid security reference server
Inj3ct0r 1337day.com http://1337day.com
10/06/2008 cluster icon
  • The Big List of Naughty Strings : The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
  • My First 10 Minutes On a Server : Primer for Securing Ubuntu
  • Position Is Everything : Modern browser bugs explained in detail!
  • OWASP : The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software.
  • Everything you need to know about HTTP security headers : This article explains what secure headers are and how to implement these headers in Rails, Django, Express.js, Go, Nginx, and Apache.

Exploit database separated by exploit type (local, remote, DoS, Poc, etc.)

security code reference hack
Copyscape http://www.copyscape.com
12/06/2007 cluster icon
  • howdoi : Instant coding answers via the command line.
  • Bandit : Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs approp...
  • Kali Linux : Penetration Testing Linux OS containing tools to test the security of system or a network.
  • YubNub.org : A social command line for the web
  • Gitleaks : Gitleaks is an open-source SAST (static application security testing) command line tool for detecting and preventing hardcoded secrets like passwords,...

Website Plagiarism Search - Web Site Content Copyright Protection

search security tool copyright
DNS Report http://www.dnsreport.com
16/05/2007 cluster icon
  • Netcraft Uptime Survey : Netcraft measures and makes available the response times of leading hosting providers' sites. The performance measurements are made at fifteen minute ...
  • SecTools.Org : Top Network Security Tools
  • sqlmap : sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of databa...
  • Harpoon : CLI tool for open source and threat intelligence. Harpoon is a tool to automate threat intelligence and open source intelligence tasks. It is written ...
  • Kali Linux : Penetration Testing Linux OS containing tools to test the security of system or a network.

The free, thorough report on the DNS for your domain

security tool network hosting
page 4 / 4
1650 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn