OWASP Foundation web repository
☆46Dec 22, 2025Updated 4 months ago
Alternatives and similar repositories for www-project-penetration-test-reporting-standard
Users that are interested in www-project-penetration-test-reporting-standard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open SAMMY codebase☆24Updated this week
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- A modular tool to search for known vulnerabilities, exploits and more across various data sources☆85Updated this week
- ☆17Dec 18, 2025Updated 4 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 10 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 9 years ago
- Phishing Template Workbench☆36Apr 14, 2026Updated 2 weeks ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 3 months ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- ☆48Feb 22, 2023Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- Subdosec is a fast, accurate subdomain takeover scanner with no false positives. It also offers a database of sites vulnerable to subdoma…☆61Feb 24, 2026Updated 2 months ago
- This program is designed to pull relevant current news articles for keywords defined in a keywords.csv file. GRC professionals can use th…☆33Jul 31, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15Aug 17, 2023Updated 2 years ago
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Nov 27, 2025Updated 5 months ago
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…☆86Apr 11, 2026Updated 2 weeks ago
- ☆14Nov 16, 2024Updated last year
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- ☆12Apr 28, 2025Updated last year
- OWASP Foundation Web Respository☆28Apr 8, 2026Updated 3 weeks ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆51Jan 19, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆18Oct 24, 2025Updated 6 months ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆13Jul 18, 2024Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- Adversary Emulation Planner☆41Jan 9, 2026Updated 3 months ago
- OWASP Foundation web repository☆36Apr 3, 2026Updated 3 weeks ago
- Slides and resources for workshops organized by Zilogic.☆16Jan 23, 2026Updated 3 months ago
- A Slack bot phishing framework for Red Teaming exercises☆165Apr 27, 2024Updated 2 years ago
- Reinforced Mitigation Security Filter☆15Sep 26, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆21Jul 9, 2025Updated 9 months ago
- ☆13Dec 2, 2024Updated last year
- Wrapper for concurrent batch processing of testssl.sh commands☆13Mar 15, 2019Updated 7 years ago
- ☆25Feb 7, 2026Updated 2 months ago
- An AI agent to use Ghidra with any AI.☆27Mar 31, 2025Updated last year
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆46Dec 7, 2025Updated 4 months ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago