OWASP Top 10 Infrastructure Security Risks
☆73Oct 20, 2025Updated 7 months ago
Alternatives and similar repositories for www-project-top-10-infrastructure-security-risks
Users that are interested in www-project-top-10-infrastructure-security-risks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Apr 9, 2024Updated 2 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆120Jul 29, 2025Updated 9 months ago
- Tools used by CSIRT and especially in the scope of CNW☆18Feb 26, 2026Updated 2 months ago
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆19Feb 26, 2026Updated 2 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 3 months ago
- OWASP Foundation Web Respository☆47Dec 22, 2025Updated 5 months ago
- Simple root privilege escalation detection using eBPF 🐝☆35Feb 10, 2026Updated 3 months ago
- KeySec Hunter is a **Chrome extension** that scans webpages and linked JavaScript files for **user-defined keywords** and **potential sec…☆60Dec 21, 2025Updated 5 months ago
- A GitHub action that allows users to subscribe to a label and automatically get @'d when the label is applied☆12Jul 18, 2023Updated 2 years ago
- Use claude code anywhere.☆63Apr 19, 2026Updated last month
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆30Apr 12, 2026Updated last month
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆49Feb 6, 2026Updated 3 months ago
- Monorepo of Labs for the Security Knowledge Framework (SKF)☆44Jun 12, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆21Apr 16, 2026Updated last month
- A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.☆156Feb 9, 2026Updated 3 months ago
- Official Writeups for HackTheBox Business CTF 2025: Operation Blackout☆66Jun 5, 2025Updated 11 months ago
- Guidance for Organization on AWS☆13Nov 26, 2025Updated 5 months ago
- ☆34Jan 18, 2026Updated 4 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Interactive CD dependency diagram☆31Feb 15, 2026Updated 3 months ago
- Merge & query nmap and nessus reports via SQL directly in your browser!☆20Jan 18, 2022Updated 4 years ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- OWASP Foundation web repository☆46Mar 9, 2026Updated 2 months ago
- InfraSight is a modular eBPF-based observability platform for Linux and Kubernetes environments. It provides deep visibility into system …☆36Oct 14, 2025Updated 7 months ago
- ☆27Jun 3, 2023Updated 2 years ago
- ☆10Aug 11, 2025Updated 9 months ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆77Sep 13, 2025Updated 8 months ago
- In addition to providing a solution to create and manage custom security controls and frameworks this repository provide an integration o…☆12Nov 14, 2023Updated 2 years ago
- Scan your dev machine for AI agents, MCP servers, IDE extensions, and suspicious packages - in seconds.☆108May 14, 2026Updated last week
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆29Feb 27, 2023Updated 3 years ago
- AWS Signer Plugin for Notation☆17Apr 21, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆31May 11, 2026Updated last week
- Stakeholder analysis for business project management☆21Apr 14, 2025Updated last year
- My-custom-sensitive-info-disclsure-nuclei-template☆31Jan 3, 2026Updated 4 months ago
- Threat models, verification standards, and security controls for AI agent architectures. Built on OWASP AISVS and NIST AI RMF.☆21Feb 17, 2026Updated 3 months ago
- Datasette plugin for outputting tables in formats suitable for copy and paste☆16Feb 17, 2024Updated 2 years ago
- URILoot is a browser extension designed for Bug Bounty Hunters and Pentesters. Makes fetching uris easy from various sources.☆63Feb 15, 2026Updated 3 months ago
- Dashboard centralizado desarrollado con Astro y React, con integración para GitHub, Azure, AWS y OpenAI. Ideal para equipos de DevOps, SR…☆19Mar 10, 2025Updated last year