OWASP / wrongsecrets-binaries
Source code for the Binaries of OWASP WrongSecrets
☆9Updated 2 months ago
Related projects: ⓘ
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆13Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆30Updated 3 years ago
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆19Updated 2 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆23Updated last year
- A tool for testing objects' permissions in AWS buckets☆39Updated 3 years ago
- Standardizing Security Titles☆13Updated last year
- Open YARA scan- and search engine☆15Updated last year
- ☆13Updated 11 months ago
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 3 years ago
- Automated Static Analysis Framework☆10Updated 2 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆11Updated 4 years ago
- sudo-parser is a tool to audit complex sudoers files☆17Updated last year
- Create machine images containing the Nessus vulnerability scanner☆10Updated this week
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- details about DIAL protocol vulnerabilities☆27Updated 9 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆25Updated 2 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆19Updated 2 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 5 months ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆12Updated 2 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆18Updated 3 years ago
- an OSINT tool to scrape sub domains from the Virus Total API☆20Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆17Updated 3 years ago
- Simple utility to manage multiple ssh☆13Updated 2 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 3 years ago
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆18Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 6 months ago
- Following repository contains source codes used in my two Books.☆10Updated 8 years ago
- Postman Integration is an extension for burp to generate Postman collection fomat json file.☆19Updated 2 years ago