OWASP Testing Guide
☆111Jan 27, 2016Updated 10 years ago
Alternatives and similar repositories for OWASP-Testing-Guide
Users that are interested in OWASP-Testing-Guide are comparing it to the libraries listed below
Sorting:
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆11Jan 27, 2017Updated 9 years ago
- .NET ASP.NET Security Analyser - Consolidation of multiple ASP.NET OWASP tools☆15Apr 25, 2015Updated 10 years ago
- All Security Engineering Resources☆14Feb 2, 2018Updated 8 years ago
- The OWASP Developer Guide☆2,142Updated this week
- Intentionally vulnerable Ruby on Rails web application for learning purposes☆17Sep 11, 2009Updated 16 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆883Dec 15, 2025Updated 2 months ago
- Owasp Proxy☆30Oct 18, 2016Updated 9 years ago
- ☆22Apr 17, 2017Updated 8 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- A bot that offers sympathy to people who have suffered paper cuts.☆17Oct 6, 2012Updated 13 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Repo for the OWASP Quick Start Guide☆10Jan 13, 2015Updated 11 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- OWASP Top Ten☆48Sep 24, 2021Updated 4 years ago
- Google BigQuery API using service account credentials.☆21Feb 22, 2016Updated 10 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- Docker container with Apache 2 / CGI shellshock vulnerable.☆12Dec 18, 2017Updated 8 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- 模拟请求工信部查询备案信息☆12Aug 29, 2018Updated 7 years ago
- 多线程网站目录穷举扫描修改版☆26Jun 17, 2016Updated 9 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- deploy a docker-swarm cluster on openstack with terraform☆11Aug 15, 2016Updated 9 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- A collection of Nagios plugins that we package.☆41Mar 22, 2016Updated 9 years ago
- ☆15Jul 9, 2020Updated 5 years ago
- Describes the very basics of sql-injection☆12Apr 23, 2021Updated 4 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- O-Saft - OWASP SSL advanced forensic tool☆383Updated this week
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017☆13Jan 23, 2017Updated 9 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- CBOR version of the JOSE specifications☆14Apr 4, 2017Updated 8 years ago
- Powershell & Python XOR 2 Files☆15Nov 22, 2018Updated 7 years ago
- ☆18Nov 4, 2021Updated 4 years ago