OWASP / offLinks
OWASP Findings Format
☆14Updated 4 years ago
Alternatives and similar repositories for off
Users that are interested in off are comparing it to the libraries listed below
Sorting:
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 8 years ago
- Collection of information security policies.☆29Updated 8 years ago
- Metasploit Framework☆26Updated 2 months ago
- BurpJDSer-ng☆29Updated 2 weeks ago
- Subdomain brute force focused on speed and data serialization☆75Updated 3 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 9 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Updated 10 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- A scripted library of hacking techniques.☆18Updated 7 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆59Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- ☆29Updated 8 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆41Updated last year
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Updated 8 years ago
- REST/JSON interface to Burp Suite☆33Updated 5 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Updated 12 years ago
- ☆90Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 8 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- Command line tool that enables automated penetration testing in the Microsoft stack using OWASP ZAP☆21Updated 10 years ago
- Automated enumeration☆30Updated 4 years ago
- Common Findings Database☆102Updated 6 years ago
- Docker Automated Build for Security Testing Tools☆14Updated 3 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Updated 10 years ago
- Source Code Intelligence☆30Updated 8 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 8 years ago