OWASP / wrongsecrets-binariesLinks
Source code for the Binaries of OWASP WrongSecrets
☆11Updated last week
Alternatives and similar repositories for wrongsecrets-binaries
Users that are interested in wrongsecrets-binaries are comparing it to the libraries listed below
Sorting:
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Updated 2 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆28Updated 2 years ago
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Updated 3 years ago
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆24Updated last month
- ☆24Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- ☆14Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆35Updated 6 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆49Updated this week
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- Dependency Combobulator☆93Updated last year
- Kenna Security API and Scripting Toolkit☆35Updated this week
- OWASP Foundation Web Respository☆10Updated 2 years ago
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- A curated threat modeling library collection☆22Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- ☆14Updated 2 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆13Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago