OWASP / wrongsecrets-ctf-partyLinks
Run Capture the Flags and Security Trainings with OWASP WrongSecrets
β47Updated this week
Alternatives and similar repositories for wrongsecrets-ctf-party
Users that are interested in wrongsecrets-ctf-party are comparing it to the libraries listed below
Sorting:
- πA curated list of product security resources.β20Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ64Updated 2 weeks ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)β44Updated 2 years ago
- InfoSec OpenAI Examplesβ19Updated last year
- A list of awesome penetration testing tools and resources.β80Updated last year
- Nuclei plugins to audit Chrome extensionsβ64Updated 10 months ago
- ReconPal: Leveraging NLP for Infosecβ56Updated 3 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilitiesβ27Updated 2 months ago
- Damn Vulnerable Rails appβ12Updated 12 years ago
- Handy scripts and one-liners to make life easierβ37Updated 2 years ago
- β22Updated 4 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.comβ39Updated 2 years ago
- π Websheep is an app based on a willingly vulnerable ReSTful APIs.β55Updated last year
- Challenge Pythonβ19Updated 2 years ago
- OWASP Foundation Web Respositoryβ9Updated this week
- Repository with some necessary information for you to create your PenTest consultancyβ97Updated 4 months ago
- β81Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academyβ17Updated 3 years ago
- Regex patterns for manual application source code reviewβ28Updated 4 years ago
- β35Updated 2 months ago
- β12Updated 3 years ago
- Sniffing out well-known threat groupsβ28Updated 9 months ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the examβ39Updated last year
- LLM Testing Findings Templatesβ72Updated last year
- Slides for my conference talksβ43Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enabβ¦β39Updated 2 years ago
- This is a RSS feed collection for all the InfoSec Content Creatorsβ32Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.β42Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlareβ59Updated 2 years ago
- β16Updated last year