OWASP / wrongsecrets-binariesLinks
Source code for the Binaries of OWASP WrongSecrets
☆11Updated last week
Alternatives and similar repositories for wrongsecrets-binaries
Users that are interested in wrongsecrets-binaries are comparing it to the libraries listed below
Sorting:
- InfoSec OpenAI Examples☆19Updated last year
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- Hashes of infamous malware☆26Updated last year
- ☆57Updated 2 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆29Updated 9 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated 2 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 10 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- ☆14Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆47Updated this week
- Training scenarios for cyber ranges☆11Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆23Updated 2 weeks ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 7 months ago
- ☆10Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- ☆15Updated 4 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- ☆14Updated 2 years ago