OWASP / owasp-istgLinks
The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results.
☆111Updated last month
Alternatives and similar repositories for owasp-istg
Users that are interested in owasp-istg are comparing it to the libraries listed below
Sorting:
- LLM Testing Findings Templates☆72Updated last year
- Collection of writeups on ICS/SCADA security.☆181Updated 3 weeks ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- Collection of all previous 1337UP CTF challenges.☆74Updated 8 months ago
- A LLM explicitly designed for getting hacked☆160Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- ☆116Updated 2 years ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆137Updated 5 months ago
- Bluetooth Security Assessment Methodology☆133Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆250Updated 4 months ago
- ☆321Updated 2 months ago
- ☆83Updated 2 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated this week
- ☆113Updated 2 years ago
- ☆191Updated 8 months ago
- This is a RSS feed collection for all the InfoSec Content Creators☆32Updated last year
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆61Updated last week
- Documentation and guidance to practice secure coding for various PLC vendors☆39Updated last year
- A research project to add some brrrrrr to Burp☆189Updated 7 months ago
- My personal OT resource list, gather throughout research and internet adventure.☆98Updated 3 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆67Updated 3 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆251Updated 3 years ago
- ☆61Updated 3 months ago
- Websec interview questions by tib3rius answered☆311Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆225Updated 3 months ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆40Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago