OWASP / owasp-istgLinks
The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results.
☆113Updated 5 months ago
Alternatives and similar repositories for owasp-istg
Users that are interested in owasp-istg are comparing it to the libraries listed below
Sorting:
- LLM Testing Findings Templates☆75Updated last year
- Collection of writeups on ICS/SCADA security.☆192Updated 2 months ago
- A LLM explicitly designed for getting hacked☆166Updated 2 years ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- ☆116Updated 2 years ago
- Bluetooth Security Assessment Methodology☆147Updated last week
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆140Updated 2 months ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year
- This is a RSS feed collection for all the InfoSec Content Creators☆33Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Updated 2 years ago
- Websec interview questions by tib3rius answered☆307Updated 2 years ago
- ☆351Updated 6 months ago
- A research project to add some brrrrrr to Burp☆196Updated 11 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆223Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆262Updated 4 months ago
- ☆202Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- Collection of all previous 1337UP CTF challenges.☆79Updated last year
- OWASP Foundation web repository☆43Updated 3 weeks ago
- ☆114Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 7 months ago
- Damn Vulnerable IoT Device☆216Updated last year
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆101Updated last year
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆102Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆255Updated 3 years ago
- ☆84Updated 2 years ago
- Watch the latest awesome security talks around the globe☆277Updated 10 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆227Updated last month
- OWASP Top 10 Infrastructure Security Risks☆44Updated 2 months ago