The Mobile Security Testing Guide (MSTG) is a manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for black-box and white-box security tests, and to help ensure c…
☆34Dec 22, 2016Updated 9 years ago
Alternatives and similar repositories for owasp-mstg
Users that are interested in owasp-mstg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆19Aug 10, 2019Updated 6 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆46Jan 22, 2025Updated last year
- Icahn Graduate School of Medicine: Systems Biology & Biotechnology Specialization☆15Jun 17, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and p…☆1,757Feb 9, 2023Updated 3 years ago
- A small script for my recon during bug hunting. Needs some modifications☆17Mar 5, 2020Updated 6 years ago
- This simple tool helps save a lot of time when gathering information about geolocation. Enter latitude and longitude once and click the b…☆28Mar 25, 2024Updated 2 years ago
- ☆27Mar 18, 2020Updated 6 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆5,179Feb 8, 2024Updated 2 years ago
- ☆27Feb 28, 2023Updated 3 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆40Aug 13, 2019Updated 6 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆12Jun 8, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆16Aug 31, 2018Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- Yet another collection of Frida scripts.☆21Mar 6, 2022Updated 4 years ago
- security.txt collection of most popular world-wide domains☆56Sep 25, 2023Updated 2 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Jun 27, 2019Updated 6 years ago
- OSCP tools and notes☆40Jan 21, 2019Updated 7 years ago
- Bash script to automate Bug Bounty Reconnaissance☆45Jan 3, 2021Updated 5 years ago
- Some of my bug bounty tools☆52Oct 23, 2019Updated 6 years ago
- Compiled binaries of various security tools☆15May 19, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A small deauth script written in ruby that uses "Packetgen" to send deauth packets to a client on a network☆15Mar 10, 2021Updated 5 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- A list of governments with Vulnerability Disclosure Policies☆100Apr 8, 2024Updated 2 years ago
- Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC☆15Dec 21, 2023Updated 2 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- ☆11Oct 25, 2021Updated 4 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- Recon for Department of Defense HackerOne program☆47Sep 27, 2018Updated 7 years ago
- ☆13Aug 13, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- List Security Guide☆19Feb 24, 2021Updated 5 years ago
- A repository of some useful grep patterns for tomnomnoms gf tool☆37Oct 11, 2020Updated 5 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆41Jul 3, 2024Updated last year
- ☆18Dec 8, 2022Updated 3 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- Most of the Google Acquisitions for Bug Bounty Hunter.☆65Sep 3, 2022Updated 3 years ago