OWASP / wrongsecrets-ctf-partyLinks
Run Capture the Flags and Security Trainings with OWASP WrongSecrets
β53Updated last week
Alternatives and similar repositories for wrongsecrets-ctf-party
Users that are interested in wrongsecrets-ctf-party are comparing it to the libraries listed below
Sorting:
- ReconPal: Leveraging NLP for Infosecβ57Updated 3 years ago
- πA curated list of product security resources.β21Updated 6 months ago
- π Websheep is an app based on a willingly vulnerable ReSTful APIs.β59Updated last year
- Handy scripts and one-liners to make life easierβ36Updated 2 years ago
- β86Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)β45Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ70Updated 7 months ago
- A list of awesome penetration testing tools and resources.β82Updated 2 years ago
- InfoSec OpenAI Examplesβ19Updated 2 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Contβ¦β50Updated last year
- A learning and testing environment for web application hacking and pentesting.β27Updated 4 years ago
- Cloudformation Template to Launch the SOC from Kali Purpleβ53Updated 2 years ago
- Jumpstart multiple WebSocket servers quicklyβ31Updated 4 years ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applicationsβ39Updated 2 years ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructureβ50Updated 5 months ago
- β25Updated 6 months ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.β47Updated 4 years ago
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome Eβ¦β30Updated 9 months ago
- Nuclei plugins to audit Chrome extensionsβ65Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enabβ¦β40Updated 3 years ago
- LLM Testing Findings Templatesβ75Updated last year
- Script to manage and create local pentesting training virtual labβ50Updated 5 years ago
- Red Team tools, infrastructure, and hardware weaponizedβ110Updated 2 months ago
- β24Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalogβ23Updated 2 years ago
- β15Updated 3 years ago
- New Framework Red Team Operationsβ19Updated 4 years ago
- An example of a mis-configured Rails application release under MIT license.β21Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.β125Updated 2 weeks ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (Vβ¦β31Updated last year