OWASP / wrongsecrets-ctf-party
Run Capture the Flags and Security Trainings with OWASP WrongSecrets
☆43Updated this week
Alternatives and similar repositories for wrongsecrets-ctf-party:
Users that are interested in wrongsecrets-ctf-party are comparing it to the libraries listed below
- Handy scripts and one-liners to make life easier☆36Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆53Updated 9 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆55Updated 2 years ago
- 📚A curated list of product security resources.☆18Updated 2 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆32Updated 2 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated 2 years ago
- A collection of one off hacks and simple scripts☆28Updated last year
- Regex patterns for manual application source code review☆26Updated 4 years ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated 2 weeks ago
- Nuclei plugins to audit Chrome extensions☆64Updated 6 months ago
- security.txt collection of most popular world-wide domains☆52Updated last year
- Penetration Testing Checklist☆35Updated 4 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 6 months ago
- Simultaneously execute various subdomain enumeration tools and aggregate results.☆43Updated 6 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 2 years ago
- Damn Vulnerable WordPress Site☆51Updated last year
- ☆58Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 2 years ago
- reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine …☆17Updated 4 years ago
- Damn Vulnerable Rails app☆12Updated 12 years ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated 3 months ago
- ☆22Updated 4 years ago