OWASP / www-project-top-10-infrastructure-security-risksLinks
OWASP Top 10 Infrastructure Security Risks
☆43Updated 3 weeks ago
Alternatives and similar repositories for www-project-top-10-infrastructure-security-risks
Users that are interested in www-project-top-10-infrastructure-security-risks are comparing it to the libraries listed below
Sorting:
- Personal Access Token (PAT) recon tool for bug bounty hunters, pentesters & red teams☆35Updated 3 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated 3 months ago
- ☆114Updated 2 years ago
- A project to visualize the software supply chain☆54Updated 2 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆110Updated 11 months ago
- ☆43Updated 3 weeks ago
- InfoSec OpenAI Examples☆19Updated last year
- boostsecurityio/lotp☆137Updated 2 weeks ago
- ☆63Updated 5 months ago
- ☆38Updated 10 months ago
- HASH (HTTP Agnostic Software Honeypot)☆140Updated last year
- Scanner to identify dangling DNS records and subdomain takeovers☆49Updated 11 months ago
- Tool for obfuscating and deobfuscating data.☆74Updated last year
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆44Updated 2 years ago
- LLM Testing Findings Templates☆74Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆227Updated 5 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 4 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Updated last month
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆21Updated 9 months ago
- ☆36Updated 2 weeks ago
- Holds the public Hacking the Cloud CTFs.☆59Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teams☆47Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated last week
- Create honeypots for cloud environments☆104Updated last month
- ☆39Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆72Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated 10 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Updated 2 years ago
- Add a layer of active defense to your cloud applications.☆96Updated 2 weeks ago