Risk-Assessment-Framework / RAF-DAST-ScannerLinks
Dast tool
☆11Updated last year
Alternatives and similar repositories for RAF-DAST-Scanner
Users that are interested in RAF-DAST-Scanner are comparing it to the libraries listed below
Sorting:
- A collection of sources of documentation and best practices to build and run a SOC☆56Updated 2 years ago
- NOVA: The Prompt Pattern Matching☆128Updated 2 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆49Updated this week
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆163Updated last year
- ☆60Updated last month
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated 2 months ago
- ☆17Updated 3 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆36Updated last month
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆55Updated 5 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated last month
- LLM Testing Findings Templates☆72Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆36Updated 8 months ago
- An index of publicly available and open-source threat detection rulesets.☆118Updated 3 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆238Updated 2 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆166Updated 2 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆54Updated 4 months ago
- ☆70Updated last month
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆63Updated this week
- ☆67Updated 5 months ago
- OWASP Top 10 Infrastructure Security Risks☆36Updated last month
- Mapping of open-source detection rules and atomic tests.☆169Updated 6 months ago
- A web CTF for training developers in bug hunting and secure coding!☆99Updated 6 months ago
- OWASP Foundation web repository☆279Updated this week
- All tools for Data Recovery☆15Updated 4 months ago
- OpenBAS Docker deployment helpers☆22Updated last week
- Modular web-application honeypot platform built using go and gin☆58Updated last year
- ☆134Updated last year
- Useful resources about phishing email analysis☆84Updated 5 months ago