There are 27 repositories under audit topic.
Automated auditing, performance metrics, and best practices for the web.
The easiest, and most secure way to access and protect all of your infrastructure.
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
WiFi security auditing tools suite
Amphion (/æmˈfaɪən/) is a toolkit for Audio, Music, and Speech Generation. Its purpose is to support reproducible research and help junior researchers and engineers get started in the field of audio, music, and speech generation research and development.
Audited (formerly acts_as_audited) is an ORM extension that logs all changes to your Rails models.
Validation of best practices in your Kubernetes clusters
Applied offensive security with Rust - https://kerkour.com/black-hat-rust
A collection of custom security tools for quick needs.
Record the change log from models in Laravel
An extensible framework to audit executing operations in .NET and .NET Core.
HardeningKitty and Windows Hardening settings and configurations
The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.
ssh rdp vnc telnet sftp bastion/jump web putty xshell terminal jumpserver audit realtime monitor rz/sz 堡垒机 云桌面 linux devops sftp websocket file management rz/sz otp 自动化运维 审计 录像 文件管理 sftp上传 实时监控 录像回放 网页版rz/sz上传下载/动态口令 django
Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber
一个支持多种不同类型数据库,覆盖事前控制、事后监督、标准发布场景,帮助您建立质量规范的SQL全生命周期质量管理平台
HardeningKitty - Checks and hardens your Windows configuration
Autogenerate RBAC policies based on Kubernetes audit logs
📱⚡️ Lighthouse for Mobile - audits your app and gives a performance score to your Android apps (native, React Native, Flutter..). Measure performance on CLI, E2E tests, CI...
The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.
记录自己对《代码审计》的理解和总结,对危险函数的深入分析以及在p牛的博客和代码审计圈的收获
Certified Smart Contract Audits for Ethereum, Solana, Near, Cardano, Aptos, Sui, Binance Smart Chain, Fantom, EOS, Tezos by softstack (formerly Chainsulting)
DevSec Linux Baseline - InSpec Profile
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
A checklist of things to look for when auditing Solidity smart contracts.