OWASP / wrongsecrets-binaries
Source code for the Binaries of OWASP WrongSecrets
☆10Updated 2 months ago
Alternatives and similar repositories for wrongsecrets-binaries:
Users that are interested in wrongsecrets-binaries are comparing it to the libraries listed below
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Open YARA scan- and search engine☆20Updated 3 weeks ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 9 months ago
- ☆14Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Automated Static Analysis Framework☆9Updated 2 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- ☆17Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 10 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- Standardizing Security Titles☆13Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Maturity Model Collaborative project☆14Updated last year
- ☆12Updated 2 months ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated last year
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆12Updated 4 months ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆19Updated 4 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆10Updated last year
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆27Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A command-line application to generate random user agent strings.☆17Updated 4 years ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 2 months ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆21Updated last year
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 4 years ago