OWASP / owasp-cstg
☆36Updated 4 years ago
Alternatives and similar repositories for owasp-cstg
Users that are interested in owasp-cstg are comparing it to the libraries listed below
Sorting:
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- learning case to prepare OSWE☆37Updated 5 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 5 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- Burp Extension for AWS Signing☆88Updated 4 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- A simple web application vulnerability lab made for the HackerOne Veterans day event☆18Updated 4 years ago
- ☆57Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Use normal web pentest tools to hack Websockets☆18Updated 5 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- ☆67Updated 6 years ago
- Virtual Security Operations Center☆50Updated last year
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 4 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆31Updated 7 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago