okuken / integrated-security-testing-environment
Integrated Security Testing Environment for Web Applications as Burp Extension.
☆62Updated last year
Alternatives and similar repositories for integrated-security-testing-environment:
Users that are interested in integrated-security-testing-environment are comparing it to the libraries listed below
- cheat sheet for penetration testing (Japanese) 🐉☆81Updated 4 years ago
- ChaetSheet for Pwn Reversing of CTF☆32Updated 4 years ago
- ONdemand csS injEctioN tool☆42Updated last year
- This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.☆45Updated last month
- 新技術に関する診断手法ドキュメントのリポジトリ☆14Updated last year
- TypeScript Scenario-Based Web Application Fuzzing Framework☆65Updated 3 years ago
- ☆11Updated 3 years ago
- ☆151Updated 3 months ago
- Archive of akictf Challenges☆57Updated 5 years ago
- ペネトレーションテストについて☆74Updated 3 years ago
- The full set of files that supported TSG CTF challenges☆30Updated 5 years ago
- ☆38Updated 2 years ago
- ☆10Updated 4 years ago
- Belle (Burp Suite 非公式日本語化ツール)☆20Updated last year
- Simple SQL Injection Lab: Hands-on guide and Docker setup for exploring MySQL and PostgreSQL injection techniques☆30Updated 2 years ago
- AVTOKYO2023 Talks ~AIチャットボットに対する Prompt Injection と Filter Bypass~☆27Updated last year
- ☆70Updated 2 years ago
- 箱庭BadStore☆40Updated 2 years ago
- ☆45Updated 8 years ago
- ☆18Updated 8 months ago
- unofficial Japanese translation of OWASP Mobile Application Security Testing Guide.☆69Updated this week
- vulnerable web application for training☆58Updated last year
- Stack-based Buffer Overflow - Vulnerable binaries and exploit samples for pwnable beginners☆18Updated 3 years ago
- ☆69Updated 2 years ago
- ☆18Updated 2 years ago
- Official OWASP Top 10 Document Repository☆29Updated 2 years ago
- ログ分析トレーニング用コンテンツ☆89Updated 4 years ago
- ☆17Updated last year
- Ochakai Hardening is a tool that allows users to easily experience incident response training.☆18Updated 4 months ago
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆45Updated 2 years ago