okuken / integrated-security-testing-environmentLinks
Integrated Security Testing Environment for Web Applications as Burp Extension.
☆63Updated 2 years ago
Alternatives and similar repositories for integrated-security-testing-environment
Users that are interested in integrated-security-testing-environment are comparing it to the libraries listed below
Sorting:
- cheat sheet for penetration testing (Japanese) 🐉☆82Updated 4 years ago
- ChaetSheet for Pwn Reversing of CTF☆32Updated 4 years ago
- AVTOKYO2023 Talks ~AIチャットボットに対する Prompt Injection と Filter Bypass~☆29Updated last year
- ONdemand csS injEctioN tool☆42Updated 2 years ago
- 新技術に関する診断手法ドキュメントのリポジトリ☆14Updated last week
- TypeScript Scenario-Based Web Application Fuzzing Framework☆65Updated 3 years ago
- ☆11Updated 3 years ago
- ☆38Updated 2 years ago
- Simple SQL Injection Lab: Hands-on guide and Docker setup for exploring MySQL and PostgreSQL injection techniques☆30Updated 2 years ago
- This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.☆54Updated last week
- ☆11Updated 4 years ago
- ペネトレーションテストについて☆74Updated 3 years ago
- Archive of akictf Challenges☆58Updated 5 years ago
- ☆69Updated 2 years ago
- ☆154Updated last month
- Belle (Burp Suite 非公式日本語化ツール)☆20Updated 2 years ago
- Restoring room images from virtual background images☆43Updated 3 years ago
- vulnerable web application for training☆57Updated last year
- ☆45Updated 8 years ago
- Official OWASP Top 10 Document Repository☆29Updated 3 years ago
- ☆60Updated 6 months ago
- Burpsuite extension. Supports CJK (Chinese, Japanese, Korean) encoding.☆26Updated this week
- Stack-based Buffer Overflow - Vulnerable binaries and exploit samples for pwnable beginners☆18Updated 3 years ago
- The full set of files that supported TSG CTF challenges☆30Updated 5 years ago
- ☆18Updated 11 months ago
- 箱庭BadStore☆40Updated 2 years ago
- ☆70Updated last month
- unofficial Japanese translation of OWASP Mobile Application Security Testing Guide.☆72Updated last week
- Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"☆44Updated 2 years ago
- 脆弱性報奨金制度に関する詳細文書を保管するレポジトリです☆35Updated last week