The Mobile Security Testing Guide (MSTG) is a manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for black-box and white-box security tests, and to help ensure c…
☆34Dec 22, 2016Updated 9 years ago
Alternatives and similar repositories for owasp-mstg
Users that are interested in owasp-mstg are comparing it to the libraries listed below
Sorting:
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆19Aug 10, 2019Updated 6 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- Icahn Graduate School of Medicine: Systems Biology & Biotechnology Specialization☆14Jun 17, 2017Updated 8 years ago
- Just some bash scripting to help your recon.☆16Feb 4, 2026Updated last month
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- A small script for my recon during bug hunting. Needs some modifications☆17Mar 5, 2020Updated 6 years ago
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and p…☆1,742Feb 9, 2023Updated 3 years ago
- ☆10Aug 20, 2020Updated 5 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- ☆27Mar 18, 2020Updated 5 years ago
- ☆28Apr 4, 2022Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆5,159Feb 8, 2024Updated 2 years ago
- List of VMWare License Keys☆10Jun 11, 2023Updated 2 years ago
- GRAnd: Extra blocks, IO, and tools for GNU Radio on Android☆10Aug 27, 2015Updated 10 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- A list of governments with Vulnerability Disclosure Policies☆99Apr 8, 2024Updated last year
- A repository of some useful grep patterns for tomnomnoms gf tool☆38Oct 11, 2020Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Jun 27, 2019Updated 6 years ago
- Dines is the definitive answer to DNS testing☆21Dec 10, 2018Updated 7 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- Trusty Dependency Risk Action☆10Feb 12, 2025Updated last year
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆25Jan 27, 2025Updated last year
- ☆11Mar 27, 2011Updated 14 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- Netwitness Maltego integration Project☆18May 9, 2017Updated 8 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Linux SocketCAN kernel module for the CANalyst II USB CAN adapter☆12Jun 10, 2019Updated 6 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Frequency domain method to determine band occupancy and modulation parameters for an ensemble of communication signals☆12Aug 24, 2017Updated 8 years ago
- A simple GNU Radio message based burst FSK Transmitter and Receiver☆12May 31, 2015Updated 10 years ago
- PHP MySQL AIML Chatbot☆14Feb 24, 2012Updated 14 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆12May 17, 2022Updated 3 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- ☆11May 18, 2018Updated 7 years ago
- Antenna Sector Patterns as obtained by Measurements in the CoNEXT'17 paper☆15Jan 24, 2019Updated 7 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago