☆19Jan 23, 2020Updated 6 years ago
Alternatives and similar repositories for OWASP-wiki-md
Users that are interested in OWASP-wiki-md are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆19Feb 22, 2017Updated 9 years ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- A continuously curated list of my favorite links and resources relating to Open Source Intelligence gathering.☆18Jul 10, 2018Updated 7 years ago
- ☆11Nov 12, 2019Updated 6 years ago
- Prevent CSRF with nginx☆14Mar 6, 2019Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- OSINT Intelligence for different areas ( useful for different type of investigations and learning etc)☆14May 20, 2020Updated 5 years ago
- Desktop app that crawls urls from Google's search engine results☆18Mar 5, 2024Updated 2 years ago
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated last month
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- ☆45Apr 3, 2024Updated last year
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- ☆16Mar 7, 2026Updated 2 weeks ago
- ☆48Dec 23, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- All The Notes And Tips I FOund In Github And Twitter I Put Them Here☆35Aug 31, 2020Updated 5 years ago
- Improvised json-based configurable Windows sandbox☆11Sep 29, 2020Updated 5 years ago
- verinice.veo is a cloud-native application for managing information security and data protection☆22Mar 17, 2026Updated last week
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- Awesome Cyber-Security Data-sets Collection☆22Aug 30, 2018Updated 7 years ago
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Jun 18, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Aug 30, 2018Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 2 months ago
- Collection of CTF Writeups☆12Dec 8, 2022Updated 3 years ago
- Code for the Presentation "Bot-in-the-middle" at Le Hack 2023!☆16Oct 9, 2023Updated 2 years ago
- Cheat Sheets☆12Feb 25, 2019Updated 7 years ago
- ☆10Feb 27, 2019Updated 7 years ago
- ACT documentation repo☆18May 22, 2024Updated last year
- ☆20Jan 12, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- The Secure Cloud Architecture (SCA) is a location & cloud agnostic flexible and repeatable conceptual deployment pattern that can adapt f…☆16Jul 13, 2020Updated 5 years ago
- ☆31Aug 21, 2022Updated 3 years ago
- Common tree for Xiaomi sm8350 devices☆10Apr 29, 2024Updated last year
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Jul 6, 2017Updated 8 years ago
- Web Defacement Detection Tool☆18Sep 24, 2019Updated 6 years ago
- Malaysia Elite Hacker Team☆11Jan 29, 2025Updated last year