☆33Jan 25, 2023Updated 3 years ago
Alternatives and similar repositories for owasp-projects
Users that are interested in owasp-projects are comparing it to the libraries listed below
Sorting:
- How to write OSSEC alerts into Graylog☆12Oct 20, 2025Updated 5 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆53Mar 4, 2026Updated 2 weeks ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆14Sep 4, 2025Updated 6 months ago
- Templates to integrate Fortify application security testing with Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP) and Oracle…☆18Nov 9, 2024Updated last year
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- Gitbook plugin that provide GitHub Buttons.☆15Nov 11, 2017Updated 8 years ago
- ☆11Mar 9, 2022Updated 4 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- This repository contains the code snippets used in "LLM Prompt Engineering For Developers"☆12Apr 22, 2024Updated last year
- ZAP test code☆14May 7, 2015Updated 10 years ago
- Unicorn Engine based running of SecureROM☆11Sep 13, 2022Updated 3 years ago
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆14Jul 22, 2024Updated last year
- ☆11Mar 22, 2016Updated 9 years ago
- Let's build the quickest snippet reference for every programming language, free to use and modify.☆13Feb 7, 2022Updated 4 years ago
- Balthazar's case and the design. Updates regularly as we progress.☆12Oct 22, 2024Updated last year
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- PoC for CVE-2022-23940☆12May 7, 2025Updated 10 months ago
- Ghostery Android Browser☆37Dec 2, 2024Updated last year
- Various Jeb plugins, including obfuscation restore☆15Jun 3, 2015Updated 10 years ago
- A self-hosted, multi-user, nostr credential vault, with cross-browser NIP-07 extension☆12Aug 31, 2025Updated 6 months ago
- ☆20Oct 2, 2024Updated last year
- Python tool to inject DLLs into processes☆11Jun 29, 2017Updated 8 years ago
- A table containing CTF challenge links and their corresponding walkthroughs from different platforms.☆11Oct 23, 2022Updated 3 years ago
- A free and open-source offline savings-tracker application for Android.☆19Nov 20, 2025Updated 4 months ago
- Tracing execution of python bytecode☆10Aug 2, 2019Updated 6 years ago
- Keep what matters. Save what's yours☆22Sep 27, 2025Updated 5 months ago
- Reverse engineering MiLight remote-controlled lightbulbs☆13May 13, 2016Updated 9 years ago
- This projects provides a logger and a connected harlem shake js.☆20May 17, 2024Updated last year
- ☆15Oct 14, 2019Updated 6 years ago
- A simple scavenger hunt to learn about pentesting a website or web application.☆16Feb 12, 2026Updated last month
- A curated list of awesome tools, resources and tutorials on online privacy and evading censorship☆10Nov 16, 2019Updated 6 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- avhttp is cocurrent http downloader☆11May 20, 2022Updated 3 years ago
- Minimal AXIS2 webshell☆12Sep 7, 2014Updated 11 years ago
- ☆11Dec 17, 2018Updated 7 years ago
- Vectorized implementation of a general feedforward neural network in Python☆10Jan 22, 2017Updated 9 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆57Nov 4, 2021Updated 4 years ago
- Demo repository for all the different ways to do eBPF Tracing☆18Feb 9, 2026Updated last month