dagheyman / awesome-product-security
πA curated list of product security resources.
β19Updated 2 years ago
Alternatives and similar repositories for awesome-product-security:
Users that are interested in awesome-product-security are comparing it to the libraries listed below
- GCP GOAT is the vulnerable application for learn the GCP Securityβ64Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enabβ¦β39Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugsβ47Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)β43Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academyβ17Updated 3 years ago
- Repo for Cybercloud Tutorials hosted at cybercloud.guruβ3Updated 7 months ago
- β55Updated last year
- Challenge Pythonβ19Updated last year
- InfoSec OpenAI Examplesβ19Updated last year
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlareβ58Updated 2 years ago
- Damn Vulnerable Rails appβ12Updated 12 years ago
- Virtual Security Operations Centerβ50Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecretsβ45Updated this week
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilitiesβ26Updated 2 weeks ago
- β12Updated 3 years ago
- Manage attack surface data on Elasticsearchβ22Updated last year
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloudβ52Updated 3 years ago
- β19Updated last year
- β35Updated last week
- β37Updated last year
- A web security research tool for DOM testingβ19Updated last week
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.β20Updated 11 months ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurityβ14Updated 4 years ago
- A not-curated list of cloud hacking labsβ23Updated 11 months ago
- Determine privileges from cloud credentials via brute-force testing.β67Updated 7 months ago
- Tools and Scripts used in CRTPβ12Updated 4 years ago
- β22Updated 4 years ago
- β22Updated 3 years ago
- β11Updated 2 years ago
- A tool for secrets management, encryption as a service, and privileged access managementβ14Updated 3 weeks ago