Home of the developement for OWASP WTE - the Web Testing Environment, a collection of pre-packaged Linux AppSec tools, apps and documentation used to create pre-configured VMs or installed ala carte in the Linux of your choice..
☆364Dec 16, 2022Updated 3 years ago
Alternatives and similar repositories for owasp-wte
Users that are interested in owasp-wte are comparing it to the libraries listed below
Sorting:
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆89Feb 14, 2024Updated 2 years ago
- Damn Vulnerable Web Application (DVWA) Vagrant Box for testing☆14Jun 23, 2016Updated 9 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- This is my path to OSCP☆11Jun 16, 2018Updated 7 years ago
- ☆13Nov 30, 2015Updated 10 years ago
- all shell backdoor in the world☆18Jun 14, 2025Updated 9 months ago
- ☆11Mar 9, 2016Updated 10 years ago
- CVE-2024-57727☆14Jan 17, 2025Updated last year
- ☆28Aug 21, 2024Updated last year
- ☆16Feb 12, 2019Updated 7 years ago
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 5 months ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- Open Security Summit 2019☆26Nov 16, 2020Updated 5 years ago
- Minimal and hacky PDF lexer☆10Jun 17, 2015Updated 10 years ago
- rsatool can be used to calculate RSA and RSA-CRT parameters☆1,569Jan 12, 2025Updated last year
- ☆15Jul 9, 2020Updated 5 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Repository for OWASP Code Review document☆17Jun 24, 2014Updated 11 years ago
- Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.o…☆1,927Updated this week
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- ☆11Jan 18, 2020Updated 6 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Oct 6, 2022Updated 3 years ago
- Tools & TTP's for Active Directory Red Teaming☆31Dec 22, 2024Updated last year
- ☆13Mar 23, 2023Updated 2 years ago
- ☆17Sep 5, 2025Updated 6 months ago
- bind your malware or reverse shell into any file (jpg - jpeg - txt - mp4 or any format ;) )☆10Mar 26, 2019Updated 6 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Passive subdomain enumeration tool for bug-bounty hunters & penetration testers.☆12Jan 10, 2021Updated 5 years ago
- Web and mobile application security training platform☆1,428Updated this week
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- Fork/mirror of Darcs repo for PyFlag (Forensic and Log Analysis GUI)☆36Oct 16, 2010Updated 15 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆636Nov 6, 2021Updated 4 years ago
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆187Aug 28, 2025Updated 6 months ago