OWASP Testing Guide
☆111Jan 27, 2016Updated 10 years ago
Alternatives and similar repositories for OWASP-Testing-Guide
Users that are interested in OWASP-Testing-Guide are comparing it to the libraries listed below
Sorting:
- .NET ASP.NET Security Analyser - Consolidation of multiple ASP.NET OWASP tools☆15Apr 25, 2015Updated 10 years ago
- Repository for OWASP Code Review document☆17Jun 24, 2014Updated 11 years ago
- The OWASP Developer Guide☆2,149Updated this week
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- ☆15Jul 9, 2020Updated 5 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆884Mar 2, 2026Updated 2 weeks ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- Write-ups for various CTF challenges solved by the team☆16Oct 6, 2017Updated 8 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017☆13Jan 23, 2017Updated 9 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆24May 16, 2013Updated 12 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- Docker container with Apache 2 / CGI shellshock vulnerable.☆12Dec 18, 2017Updated 8 years ago
- O-Saft - OWASP SSL advanced forensic tool☆383Feb 24, 2026Updated 3 weeks ago
- Content for OWASP Summit 2017 site☆129Nov 12, 2020Updated 5 years ago
- Web and mobile application security training platform☆1,428Updated this week
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- OWASP Benchmark is a test suite designed to verify the speed and accuracy of software vulnerability detection tools. A fully runnable web…☆780Updated this week
- Owasp Proxy☆30Oct 18, 2016Updated 9 years ago
- ☆22Apr 17, 2017Updated 8 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- OWASP Passfault evaluates passwords and enforces password policy in a completely different way.☆177Feb 23, 2021Updated 5 years ago
- Application Security Verification Standard☆3,373Updated this week
- CBOR version of the JOSE specifications☆14Apr 4, 2017Updated 8 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- The OWASP AppSec Browser Bundle is an open source Linux based penetration testing browser bundle built over Mozilla Firefox. It comes pre…☆98Dec 24, 2013Updated 12 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- ☆21Oct 3, 2019Updated 6 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Jun 9, 2018Updated 7 years ago