OWASP / wrongsecrets-ctf-party
Run Capture the Flags and Security Trainings with OWASP WrongSecrets
β45Updated this week
Alternatives and similar repositories for wrongsecrets-ctf-party:
Users that are interested in wrongsecrets-ctf-party are comparing it to the libraries listed below
- πA curated list of product security resources.β19Updated 2 years ago
- ReconPal: Leveraging NLP for Infosecβ56Updated 2 years ago
- β22Updated 4 years ago
- InfoSec OpenAI Examplesβ19Updated last year
- A list of awesome penetration testing tools and resources.β80Updated last year
- β20Updated last year
- Handy scripts and one-liners to make life easierβ37Updated 2 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlareβ58Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ64Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enabβ¦β39Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academyβ17Updated 3 years ago
- Slides for my conference talksβ43Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.β47Updated 3 years ago
- Simultaneously search CVEs and exploits across multiple cybersecurity data sources.β13Updated 3 years ago
- Script to manage and create local pentesting training virtual labβ49Updated 4 years ago
- A learning and testing environment for web application hacking and pentesting.β26Updated 4 years ago
- Collection of Tools & Techniques for analyzing URLsβ30Updated last year
- β12Updated 3 years ago
- β34Updated last year
- β35Updated 2 weeks ago
- Damn Vulnerable Rails appβ12Updated 12 years ago
- Damn Vulnerable WordPress Siteβ51Updated 2 years ago
- Virtual Security Operations Centerβ50Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashesβ30Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)β43Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.β40Updated 2 years ago
- β26Updated 7 months ago
- Sniffing out well-known threat groupsβ28Updated 8 months ago
- Data from Dark Web Marketplace scraping - Be carefulβ39Updated 5 months ago
- Do bulk whois lookups and get alerted on domains of interest.β34Updated 8 months ago