OWASP / www-project-top-10-infrastructure-security-risksLinks
OWASP Top 10 Infrastructure Security Risks
☆40Updated 3 weeks ago
Alternatives and similar repositories for www-project-top-10-infrastructure-security-risks
Users that are interested in www-project-top-10-infrastructure-security-risks are comparing it to the libraries listed below
Sorting:
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆226Updated 3 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆109Updated 10 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆112Updated last month
- ☆113Updated 2 years ago
- A project to visualize the software supply chain☆53Updated 2 years ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆101Updated 3 months ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆38Updated 8 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆114Updated 4 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Updated last year
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆57Updated 7 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Updated 8 months ago
- LLM Testing Findings Templates☆73Updated last year
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆98Updated last week
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆104Updated last year
- Tool for obfuscating and deobfuscating data.☆72Updated last year
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆90Updated last month
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- ☆41Updated 7 months ago
- Personal Access Token (PAT) recon tool for bug bounty hunters, pentesters & red teams☆27Updated 2 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆66Updated 3 months ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- This is a RSS feed collection for all the InfoSec Content Creators☆32Updated last year
- ☆61Updated 3 months ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆40Updated 2 years ago
- a hackbot proof-of-concept☆40Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆95Updated 4 months ago
- ☆39Updated last year
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year