OWASP / owasp-istgLinks
The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results.
☆109Updated 3 weeks ago
Alternatives and similar repositories for owasp-istg
Users that are interested in owasp-istg are comparing it to the libraries listed below
Sorting:
- LLM Testing Findings Templates☆72Updated last year
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆46Updated last year
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆164Updated last year
- A LLM explicitly designed for getting hacked☆158Updated 2 years ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆113Updated 2 years ago
- Collection of writeups on ICS/SCADA security.☆181Updated 5 months ago
- ☆116Updated 2 years ago
- Watch the latest awesome security talks around the globe☆277Updated 6 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆50Updated last week
- Damn Vulnerable IoT Device☆212Updated last year
- Bluetooth Security Assessment Methodology☆133Updated last year
- This is a RSS feed collection for all the InfoSec Content Creators☆32Updated last year
- ☆83Updated 2 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆134Updated 4 months ago
- ☆184Updated 7 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆247Updated 4 months ago
- ☆316Updated 2 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 3 months ago
- OWASP Top 10 Infrastructure Security Risks☆37Updated 2 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆220Updated 2 months ago
- OWASP Code Review Guide Web Repository☆137Updated 3 years ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆40Updated 2 years ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆296Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆251Updated 2 years ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆196Updated 11 months ago
- OWASP IoT Security Verification Standard (ISVS)☆144Updated 2 years ago
- ☆61Updated 2 months ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆160Updated 4 years ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆48Updated last year