📚A curated list of product security resources.
☆23Jun 11, 2025Updated 10 months ago
Alternatives and similar repositories for awesome-product-security
Users that are interested in awesome-product-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆20Mar 27, 2024Updated 2 years ago
- Simple and pratical security gate for Github Security Alerts☆19Mar 21, 2026Updated 3 weeks ago
- Burp Plugin for Contrast Security☆16Oct 8, 2025Updated 6 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Follow all members of a list☆12Dec 20, 2021Updated 4 years ago
- ☆12Aug 10, 2022Updated 3 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 4 months ago
- OWASP Foundation web repository☆17Oct 11, 2025Updated 6 months ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆33Aug 25, 2021Updated 4 years ago
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- ☆14Aug 10, 2022Updated 3 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- ☆29Mar 25, 2026Updated 3 weeks ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- ☆26Jul 17, 2024Updated last year
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- CrlfiX☆22Jan 30, 2025Updated last year
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆15Nov 15, 2023Updated 2 years ago
- AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automati…☆29Aug 17, 2022Updated 3 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated 2 years ago
- This repository contains a list of roadmaps I created with my suggestions on LinkedIn and Twitter.🤞🏻😌☆214Nov 27, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.☆31Apr 23, 2024Updated last year
- simple rest api using go-chi☆13Nov 4, 2021Updated 4 years ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆108Apr 3, 2024Updated 2 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Nov 22, 2017Updated 8 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago