OWASP / wrongsecrets-binaries
Source code for the Binaries of OWASP WrongSecrets
☆11Updated this week
Alternatives and similar repositories for wrongsecrets-binaries
Users that are interested in wrongsecrets-binaries are comparing it to the libraries listed below
Sorting:
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆46Updated this week
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆28Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 9 months ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆13Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- ☆57Updated last year
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆28Updated 9 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- sudo-parser is a tool to audit complex sudoers files☆17Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 7 months ago
- ☆24Updated 3 years ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆14Updated 8 months ago
- Burp Suite DAST Power Tools☆18Updated 2 weeks ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- ☆14Updated 2 years ago