OWASP / owasp-istgLinks
The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results.
β112Updated 2 months ago
Alternatives and similar repositories for owasp-istg
Users that are interested in owasp-istg are comparing it to the libraries listed below
Sorting:
- LLM Testing Findings Templatesβ74Updated last year
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β138Updated 2 weeks ago
- A LLM explicitly designed for getting hackedβ162Updated 2 years ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.β166Updated 2 years ago
- Bluetooth Security Assessment Methodologyβ137Updated last year
- β116Updated 2 years ago
- Collection of all previous 1337UP CTF challenges.β75Updated 9 months ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responsesβ112Updated 2 years ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applicationsβ46Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecretsβ52Updated last week
- This is a RSS feed collection for all the InfoSec Content Creatorsβ32Updated last year
- β114Updated 2 years ago
- β84Updated 2 years ago
- Collection of writeups on ICS/SCADA security.β185Updated last week
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessionsβ104Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive filesβ227Updated 4 months ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ68Updated 5 months ago
- boostsecurityio/lotpβ136Updated this week
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.β253Updated last month
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.β304Updated last year
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agentsβ64Updated 5 months ago
- Watch the latest awesome security talks around the globeβ277Updated 8 months ago
- Damn Vulnerable IoT Deviceβ212Updated last year
- β201Updated 9 months ago
- A research project to add some brrrrrr to Burpβ194Updated 8 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that β¦β253Updated 3 years ago
- β337Updated 4 months ago
- HASH (HTTP Agnostic Software Honeypot)β138Updated last year
- My personal collection of resources (mostly tools and training materials) for source code security audits.β92Updated last year
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scenaβ¦β218Updated last year