OWASP / owasp-istgLinks
The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results.
☆101Updated 9 months ago
Alternatives and similar repositories for owasp-istg
Users that are interested in owasp-istg are comparing it to the libraries listed below
Sorting:
- ☆115Updated 2 years ago
- LLM Testing Findings Templates☆72Updated last year
- A LLM explicitly designed for getting hacked☆152Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 9 months ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year
- Bluetooth Security Assessment Methodology☆131Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ☆111Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last month
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 2 months ago
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆85Updated 10 months ago
- A research project to add some brrrrrr to Burp☆178Updated 4 months ago
- ☆81Updated 2 years ago
- My personal OT resource list, gather throughout research and internet adventure.☆87Updated 3 weeks ago
- This is a RSS feed collection for all the InfoSec Content Creators☆32Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆162Updated 7 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆220Updated 2 weeks ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆122Updated 2 months ago
- Collection of all previous 1337UP CTF challenges.☆74Updated 5 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆111Updated 2 years ago
- Operational Technology Cyber Attack Database☆49Updated 2 years ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆54Updated last month
- Damn Vulnerable IoT Device☆210Updated last year
- ☆35Updated 2 months ago
- Collection of writeups on ICS/SCADA security.☆176Updated 3 months ago
- ☆179Updated 5 months ago