ostif-org / OSTIF
Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF
☆32Updated 2 weeks ago
Alternatives and similar repositories for OSTIF:
Users that are interested in OSTIF are comparing it to the libraries listed below
- aws cli pentesting/red team snippets☆32Updated last year
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Manage attack surface data on Elasticsearch☆22Updated last year
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆28Updated 9 months ago
- ☆17Updated 2 years ago
- My talks...☆24Updated 2 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- This repository contains a mindmap for different techniques for using Censys Search☆13Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆46Updated this week
- A DMARC scanning and parsing tool.☆33Updated last month
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- A not-curated list of cloud hacking labs☆25Updated last year
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆32Updated 2 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Updated last year
- ☆15Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Dependency Combobulator☆93Updated last year
- 📚A curated list of product security resources.☆19Updated 2 years ago
- ☆20Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated last week
- Penetration Testing & Red Team tools & scripts☆12Updated last year
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆11Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- Cloud Pentesting Resource Collection☆23Updated last year
- A utility for recursively traversing SSL/TLS certificates for collecting DNS names☆46Updated last year