ostif-org / OSTIFLinks
Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF
☆34Updated last week
Alternatives and similar repositories for OSTIF
Users that are interested in OSTIF are comparing it to the libraries listed below
Sorting:
- Jumpstart multiple WebSocket servers quickly☆31Updated 4 years ago
- Manage attack surface data on Elasticsearch☆23Updated 2 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated 2 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Updated 2 months ago
- aws cli pentesting/red team snippets☆32Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- ☆19Updated 3 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- ☆90Updated 3 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 6 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Citrix Scanner for CVE-2023-3519☆53Updated 2 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Updated 4 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Advanced test for proxy & waf☆13Updated 4 months ago
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 3 years ago
- Dependency Combobulator☆95Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 3 years ago
- ☆76Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Information about Progress MoveIT CVE☆11Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year