adanalvarez / owasp-wstg-trackerLinks
Simple web app to track OWASP WSTG security testing progress
☆28Updated 3 months ago
Alternatives and similar repositories for owasp-wstg-tracker
Users that are interested in owasp-wstg-tracker are comparing it to the libraries listed below
Sorting:
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆50Updated 2 months ago
- PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in fi…☆183Updated 4 months ago
- ☆191Updated 7 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆86Updated last week
- Cloud subdomains identification tool☆61Updated 8 months ago
- ☆56Updated 2 months ago
- ☆47Updated 9 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆106Updated 3 months ago
- FrogPost: postMessage Security Testing Tool☆104Updated last week
- ☆19Updated this week
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆100Updated 5 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆108Updated 5 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆102Updated 4 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆47Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆225Updated 8 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆152Updated 2 months ago
- ☆27Updated 5 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆136Updated last month
- List of tools and resources for pentesting Microsoft Active Directory☆109Updated 5 months ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 8 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆314Updated last month
- This repository serves as a curated resource for OffSec's OSEP (PEN-300) certification preparation, containing useful links, materials, a…☆64Updated last year
- Dredging up secrets from the depths of the file system☆131Updated last year
- ☆95Updated 8 months ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- ☆39Updated 5 months ago
- ☆41Updated 11 months ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆85Updated 10 months ago
- ☆174Updated 8 months ago
- ☆54Updated 2 years ago