☆35Jun 30, 2020Updated 5 years ago
Alternatives and similar repositories for owasp-cstg
Users that are interested in owasp-cstg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Jul 7, 2018Updated 7 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆46Feb 2, 2023Updated 3 years ago
- Limit USB devices plugged to a linux host☆12Feb 12, 2018Updated 8 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- SqlServer Linked Password Dumper.☆17Apr 28, 2017Updated 8 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Jan 19, 2021Updated 5 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- An industrial strength, best practice reference architecture showing how to prevent credential sprawl with Vault on AWS☆18Jun 18, 2017Updated 8 years ago
- Awesome BLE Hack repository☆12Apr 7, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- One CTF Platform☆20Dec 4, 2019Updated 6 years ago
- Script which expands a FS to the size of the SDcard minus a bit☆22Jul 17, 2024Updated last year
- Easily create index of your SANS books☆18Oct 28, 2022Updated 3 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- A python tool to dissect various BLE GATT packets for replay and analysis.☆13Dec 29, 2019Updated 6 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Sep 2, 2022Updated 3 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- 搜索几个网站的云盘资源,并过滤到失效链接,最后不保证资源的有效性☆20Jun 25, 2018Updated 7 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 6 months ago
- BlueRepli-Plus☆18Jul 17, 2020Updated 5 years ago
- Crappy shell script that port scans using curl☆13May 3, 2017Updated 8 years ago
- Continuous deployment made easy and secure☆19Jan 6, 2015Updated 11 years ago
- ☆21Sep 25, 2018Updated 7 years ago
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆10Apr 1, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PoC for CVE-2020-8617 (BIND)☆45May 20, 2020Updated 5 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- ☆17Oct 21, 2023Updated 2 years ago
- ☆13Aug 10, 2022Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- Bioinformatics Training Platform (BTP) Workshop: Introduction to NGS☆10Oct 31, 2018Updated 7 years ago