The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers / servers / IoT devices)
☆303Oct 6, 2023Updated 2 years ago
Alternatives and similar repositories for SecureTea-Project
Users that are interested in SecureTea-Project are comparing it to the libraries listed below
Sorting:
- The Secure Coding Framework☆272Aug 18, 2020Updated 5 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- OWASP Honeypot, Automated Deception Framework.☆478Sep 15, 2024Updated last year
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆89Jan 21, 2026Updated 2 months ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- Application Security Automation☆527Sep 5, 2023Updated 2 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- O-Saft - OWASP SSL advanced forensic tool☆383Feb 24, 2026Updated 3 weeks ago
- Hash Checker Bypass and Process Hacker☆18Nov 14, 2021Updated 4 years ago
- Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.o…☆1,927Updated this week
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- .NET ASP.NET Security Analyser - Consolidation of multiple ASP.NET OWASP tools☆15Apr 25, 2015Updated 10 years ago
- OWASP IoT Top 10 2018 Mapping Project☆21Oct 16, 2019Updated 6 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Aug 14, 2023Updated 2 years ago
- Looks up permissions within Active Directory on a target (OU or Computer) to determine access to LAPS attributes (ms-Mcs-AdmPwdExpiration…☆16May 31, 2023Updated 2 years ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆4,884Mar 12, 2026Updated last week
- ☆13Oct 14, 2017Updated 8 years ago
- IoTGoat is a deliberately insecure firmware based on OpenWrt.☆185Mar 29, 2020Updated 5 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- Web and mobile application security training platform☆1,428Updated this week
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Aug 10, 2023Updated 2 years ago
- OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS☆449Dec 29, 2025Updated 2 months ago
- ☆38Jul 3, 2020Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- A powerful target reconnaissance framework powered by graph theory.☆420Oct 21, 2022Updated 3 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Jul 10, 2018Updated 7 years ago
- OWASP Foundation Web Respository☆75Updated this week
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆360May 31, 2024Updated last year
- Exploit for win10 SMB3.1☆18Apr 5, 2020Updated 5 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Tool to predict attacker groups from the techniques and software used☆49Aug 4, 2021Updated 4 years ago