OWASP / owasp-cstgLinks
☆36Updated 5 years ago
Alternatives and similar repositories for owasp-cstg
Users that are interested in owasp-cstg are comparing it to the libraries listed below
Sorting:
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- Burp Extension for AWS Signing☆89Updated 6 months ago
- learning case to prepare OSWE☆37Updated 5 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- ☆90Updated 3 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- ☆67Updated 6 years ago
- This script is a multi-threaded Okta password sprayer.☆72Updated last year
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated last year
- ☆148Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- Posts about different topics☆36Updated last year
- An AWS Lambda vulnerable application written in flask.☆49Updated 7 years ago
- ☆58Updated 2 years ago
- A lab to play with authentication and authorisation problems☆96Updated 2 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆54Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- ☆127Updated last year
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 9 months ago
- Pivot into private VPC networks using a VPN connection☆43Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year