Run Capture the Flags and Security Trainings with OWASP WrongSecrets
☆55Mar 18, 2026Updated this week
Alternatives and similar repositories for wrongsecrets-ctf-party
Users that are interested in wrongsecrets-ctf-party are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆20Dec 22, 2025Updated 3 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- OWASP Foundation Web Repository☆19Feb 19, 2026Updated last month
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Open Security Summit 2019☆26Nov 16, 2020Updated 5 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Collection of my Security Blueprints & Guides☆52Oct 2, 2025Updated 5 months ago
- ☆90Aug 5, 2023Updated 2 years ago
- ☆16Oct 18, 2024Updated last year
- Garudaastra Tool is based on python3 to find cameras around the world☆28Jun 29, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- redteamrecipe.com☆24Feb 9, 2024Updated 2 years ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆20Mar 15, 2021Updated 5 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 9 months ago
- Retrieve AD accounts description and search for password in it☆81Jul 21, 2022Updated 3 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 9 months ago
- Coherent Line Drawing OpenFaaS function based on https://github.com/esimov/colidr☆10May 2, 2021Updated 4 years ago
- An Open Letter to the OWASP Board☆108Aug 7, 2023Updated 2 years ago
- Smart, friendly and helpful chat bot for OWASP Juice Shop☆11Jan 26, 2026Updated last month
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- ☆63Apr 10, 2023Updated 2 years ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Sep 8, 2021Updated 4 years ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆88Dec 29, 2023Updated 2 years ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆322Nov 12, 2025Updated 4 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- ☆25Jul 7, 2022Updated 3 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 8 months ago