OWASP Foundation web repository
☆44Dec 22, 2025Updated 3 months ago
Alternatives and similar repositories for www-project-penetration-test-reporting-standard
Users that are interested in www-project-penetration-test-reporting-standard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 10 months ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 10 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated 2 years ago
- Specification for OmniBOR, reproducible identifiers & fine-grained build dependency tracking for software artifacts.☆26Nov 17, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- ☆48Feb 22, 2023Updated 3 years ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆12Jul 18, 2024Updated last year
- ☆15Aug 17, 2023Updated 2 years ago
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Dec 30, 2024Updated last year
- A low-cost remote vital signs monitor for home patients☆12Feb 19, 2026Updated last month
- ☆14Nov 16, 2024Updated last year
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆52Jan 19, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆16Oct 24, 2025Updated 5 months ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆18Jul 9, 2025Updated 9 months ago
- This ReadMe will be updated from time to time with the URL to download latest firmware for TP-Link Tapo cameras I have.☆16Jul 5, 2024Updated last year
- Tiny and fast port scanner (Sliver edition)☆28Feb 17, 2026Updated last month
- OWASP Foundation web repository☆36Mar 16, 2026Updated 3 weeks ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- Wrapper for concurrent batch processing of testssl.sh commands☆13Mar 15, 2019Updated 7 years ago
- ☆25Feb 7, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An AI agent to use Ghidra with any AI.☆24Mar 31, 2025Updated last year
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- A browser for open-data-registry: https://github.com/awslabs/open-data-registry☆42Feb 12, 2026Updated last month
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆45Dec 7, 2025Updated 4 months ago
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Jul 7, 2023Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆84May 3, 2024Updated last year
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- A Google Assistant Assistant☆12Aug 13, 2020Updated 5 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An open-source software based testing framework for automotive cybersecurity☆12Jul 14, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- Sporta is a dynamic app designed for sports enthusiasts who want to connect 🤝, compete 🏆, and play 🏀🎾⚽ with others.☆10Apr 24, 2025Updated 11 months ago
- My mpv.net configuration files☆12Jul 10, 2022Updated 3 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- Hyperterm theme based on gruvbox☆17Feb 10, 2017Updated 9 years ago
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆12Aug 4, 2022Updated 3 years ago