Skip to content
View ToddBenson's full-sized avatar

Block or report ToddBenson

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Scan your code for security misconfiguration, search for passwords and secrets. 🔍

JavaScript 639 89 Updated Jun 23, 2023

Small Node CLI tool to extract active contributors on repos and orgs

JavaScript 10 14 Updated Dec 6, 2022

🐋 Docker Cheat Sheet 🐋

3,780 467 Updated Dec 10, 2023

OWASP Cloud Security - Enabling conversations through threat and control stories

Gherkin 178 23 Updated Dec 7, 2018

A tool to capture all the git secrets by leveraging multiple open source git searching tools

Go 1,118 194 Updated Jun 25, 2019

Cloud Security Posture Management (CSPM)

JavaScript 3,408 692 Updated Jan 15, 2025

goSDL

PHP 525 83 Updated Nov 24, 2022

Example code for my book on TDD with Python

JavaScript 1,469 566 Updated Jan 18, 2025

The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.

Shell 9,236 1,023 Updated Oct 21, 2024

answering: who are all these users in my GitHub org?

Scala 225 56 Updated Dec 27, 2024

A collection of TDD exercises that are useful as katas

C# 73 28 Updated May 27, 2016

User, contributor and developer friendly vulnerability database

Python 129 29 Updated Dec 14, 2018

Created by Jin Qian via the GitHub Connector

Perl 431 110 Updated Oct 4, 2023

Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.

HTML 4,854 1,162 Updated Jun 29, 2024

Abusing Self-XSS and Clickjacking to trigger XSS

HTML 130 34 Updated Mar 18, 2017

Manages application of security headers with many safe defaults

Ruby 3,163 252 Updated Jan 20, 2025

Getting a Maven-powered Spring Boot project packaging in Concourse

Shell 5 11 Updated Nov 21, 2017

Compliance automation for cloud.gov

Shell 36 22 Updated Sep 27, 2024

BDD Automated Security Tests for Web Applications

Java 565 178 Updated Nov 16, 2022

Introduction to Cloud Foundry app deployment and management concepts.

HTML 31 142 Updated Sep 21, 2020

Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…

Python 4,581 1,694 Updated Jun 15, 2020

KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from an…

Eagle 1,100 252 Updated Mar 2, 2017

Post Exploitation Collection

C 1,556 358 Updated May 1, 2020

Learn to use https://concourse-ci.org with this linear sequence of tutorials. Learn each concept that builds on the previous concept.

Shell 872 552 Updated Nov 17, 2023

A collection of awesome penetration testing resources, tools and other shiny things

22,345 4,498 Updated Dec 14, 2024

Developer workflow convenience scripts

Ruby 277 77 Updated May 25, 2021

The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.

Python 5,208 1,240 Updated Sep 22, 2024

a ruggedization framework that embodies the principle "be mean to your code"

Ruby 982 188 Updated Jun 20, 2022

Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.

Shell 3,478 827 Updated Jan 21, 2025
Next