OWASP / owasp-istg
The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility to adapt innovations, and developments in the IoT market while still ensuring comparability of test results.
☆95Updated 4 months ago
Alternatives and similar repositories for owasp-istg:
Users that are interested in owasp-istg are comparing it to the libraries listed below
- ☆115Updated last year
- Bluetooth Security Assessment Methodology☆112Updated 8 months ago
- Operational Technology Cyber Attack Database☆47Updated 2 years ago
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆45Updated 9 months ago
- HASH (HTTP Agnostic Software Honeypot)☆136Updated 9 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆158Updated last year
- ☆162Updated last month
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆132Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆95Updated last month
- Collection of all previous 1337UP CTF challenges.☆63Updated last month
- ☆33Updated last month
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated 10 months ago
- ☆109Updated last year
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆60Updated 5 months ago
- an extension for Burp Suite to allow researchers to utilize GPT for analys is of HTTP requests and responses☆98Updated last year
- This is a RSS feed collection for all the InfoSec Content Creators☆31Updated last year
- LLM Testing Findings Templates☆66Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆238Updated 2 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆156Updated 3 months ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆56Updated 2 years ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆62Updated last week
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated 2 weeks ago
- A LLM explicitly designed for getting hacked☆136Updated last year
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆89Updated 11 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆123Updated 10 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆43Updated this week
- Collection of writeups on ICS/SCADA security.☆168Updated last month
- ☆93Updated 2 years ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆103Updated last month