To contribute to this collection of cybersecurity tools, please follow these guidelines:
-
Review the Contribution Principles: Familiarize yourself with the overarching goals and principles of this collection to ensure alignment with its pur>
-
Avoid Duplicates: Before submitting, search existing tools and contributions to avoid redundancy.
-
Ensure Relevance: Submissions should be meaningful and add value. Each tool must include a clear, concise description that highlights its utility.
-
Cross-Reference: While not required, linking back to this collection from your own repository is encouraged to help others discover a broader range of>
-
Submit Individually: Create a separate pull request for each tool or suggestion to maintain clarity and focus.
-
Formatting Standards:
- Capitalize the titles of tools and categories.
- Use the following format for links:
[Tool Name](link)
- Add new links to the bottom of the appropriate category.
-
Category Management: Feel free to introduce new categories or enhance existing ones for better organization.
-
Proofread: Ensure your contribution is free from spelling and grammar errors.
-
Clean Code: Configure your text editor to eliminate any trailing whitespace.
-
Descriptive Commits: Provide a meaningful title for both your pull request and commit to clearly convey the purpose of your contribution.
Thank you for enhancing this collection with your valuable contributions!