OWASP / www-project-top-10-infrastructure-security-risksLinks
OWASP Top 10 Infrastructure Security Risks
☆44Updated 2 months ago
Alternatives and similar repositories for www-project-top-10-infrastructure-security-risks
Users that are interested in www-project-top-10-infrastructure-security-risks are comparing it to the libraries listed below
Sorting:
- Personal Access Token (PAT) recon tool for bug bounty hunters, pentesters & red teams☆39Updated 5 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆113Updated 5 months ago
- Create honeypots for cloud environments☆109Updated 3 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Updated 2 years ago
- ☆38Updated last week
- ☆44Updated 2 months ago
- A project to visualize the software supply chain☆57Updated 2 years ago
- ☆114Updated 2 years ago
- ☆38Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Updated last year
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- Tool for obfuscating and deobfuscating data.☆75Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Updated 9 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 6 months ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆48Updated 2 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆118Updated last month
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆70Updated last month
- AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection☆239Updated last month
- Monorepo of Labs for the Security Knowledge Framework (SKF)☆41Updated 7 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 7 months ago
- ☆30Updated this week
- InfoSec OpenAI Examples☆19Updated 2 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated this week
- A GitHub Actions Supply Chain CTF / Goat☆30Updated last week