OWASP / owasp-istgLinks
The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results.
☆112Updated 2 months ago
Alternatives and similar repositories for owasp-istg
Users that are interested in owasp-istg are comparing it to the libraries listed below
Sorting:
- Collection of writeups on ICS/SCADA security.☆182Updated last month
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆112Updated 2 years ago
- A LLM explicitly designed for getting hacked☆162Updated 2 years ago
- Collection of all previous 1337UP CTF challenges.☆74Updated 9 months ago
- LLM Testing Findings Templates☆73Updated last year
- Bluetooth Security Assessment Methodology☆135Updated last year
- ☆116Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated this week
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆165Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆137Updated 6 months ago
- This is a RSS feed collection for all the InfoSec Content Creators☆33Updated last year
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆219Updated last year
- ☆330Updated 3 months ago
- ☆113Updated 2 years ago
- Damn Vulnerable IoT Device☆212Updated last year
- ☆196Updated 8 months ago
- Websec interview questions by tib3rius answered☆311Updated last year
- ☆83Updated 2 years ago
- A research project to add some brrrrrr to Burp☆191Updated 7 months ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆40Updated 2 years ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆63Updated 5 months ago
- OWASP IoT Security Verification Standard (ISVS)☆144Updated 2 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆251Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆67Updated 4 months ago
- A curated list of Awesome Security Challenges.☆197Updated 11 months ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆302Updated last year
- My personal OT resource list, gather throughout research and internet adventure.☆106Updated 4 months ago
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆93Updated last year
- Watch the latest awesome security talks around the globe☆278Updated 7 months ago