☆35Jun 30, 2020Updated 5 years ago
Alternatives and similar repositories for owasp-cstg
Users that are interested in owasp-cstg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆47Feb 2, 2023Updated 3 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 7 years ago
- Repository to host scripts discussed in https://www.notsosecure.com/crafting-way-json-web-tokens/☆15Aug 4, 2018Updated 7 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated 2 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆22Jun 9, 2019Updated 6 years ago
- SqlServer Linked Password Dumper.☆17Apr 28, 2017Updated 9 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Jan 19, 2021Updated 5 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 6 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- One CTF Platform☆20Dec 4, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Easily create index of your SANS books☆18Oct 28, 2022Updated 3 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 9 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Sep 2, 2022Updated 3 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- 搜索几个网站的云盘资源,并过滤到失效链接,最后不保证资源的有效性☆20Jun 25, 2018Updated 7 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 4 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- birthday wish to hack font camera☆14Oct 18, 2025Updated 6 months ago
- Crappy shell script that port scans using curl☆13May 3, 2017Updated 9 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- ☆21Sep 25, 2018Updated 7 years ago
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆10Apr 1, 2024Updated 2 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- A better alternative to RunDLL32☆35Jun 11, 2019Updated 6 years ago
- ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit☆48Oct 14, 2021Updated 4 years ago
- A scriptable debugger library to interact with Android applications☆46Sep 27, 2013Updated 12 years ago
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 8 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 4 years ago
- My OSCP cheat sheet☆22Aug 4, 2024Updated last year