The Mobile Security Testing Guide (MSTG) is a manual for testing the security of mobile apps. It describes technical processes for verifying the controls listed in the OWASP Mobile Application Verification Standard (MASVS). The MSTG is meant to provide a baseline set of test cases for black-box and white-box security tests, and to help ensure c…
☆34Dec 22, 2016Updated 9 years ago
Alternatives and similar repositories for owasp-mstg
Users that are interested in owasp-mstg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆19Aug 10, 2019Updated 6 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆46Jan 22, 2025Updated last year
- OWASP based Web Application Security Testing Checklist is an Excel based checklist which helps you to track the status of completed and p…☆1,749Feb 9, 2023Updated 3 years ago
- Just some bash scripting to help your recon.☆16Feb 4, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- A Kubernetes service reverse proxy that requires no configuration☆13Oct 4, 2015Updated 10 years ago
- An automated wrapper script for patching iOS applications (IPA files) and work on non-jailbroken device☆121Oct 6, 2017Updated 8 years ago
- This simple tool helps save a lot of time when gathering information about geolocation. Enter latitude and longitude once and click the b…☆28Mar 25, 2024Updated 2 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- ☆27Mar 18, 2020Updated 6 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆5,176Feb 8, 2024Updated 2 years ago
- ☆26Feb 28, 2023Updated 3 years ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆12Jun 8, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆16Aug 31, 2018Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- Ruby ARP Toolkit☆14Apr 15, 2021Updated 4 years ago
- Yet another collection of Frida scripts.☆21Mar 6, 2022Updated 4 years ago
- security.txt collection of most popular world-wide domains☆56Sep 25, 2023Updated 2 years ago
- Bash script to automate Bug Bounty Reconnaissance☆45Jan 3, 2021Updated 5 years ago
- Some of my bug bounty tools☆52Oct 23, 2019Updated 6 years ago
- Compiled binaries of various security tools☆15May 19, 2021Updated 4 years ago
- 基于Frida的脱壳工具☆12Mar 8, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A small deauth script written in ruby that uses "Packetgen" to send deauth packets to a client on a network☆15Mar 10, 2021Updated 5 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- A list of governments with Vulnerability Disclosure Policies☆99Apr 8, 2024Updated last year
- This repo hosts multiple codes, content, checklists etc which can help a penetration tester in a web application auditing.☆21Sep 14, 2023Updated 2 years ago
- Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC☆14Dec 21, 2023Updated 2 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- Gitlab CI/CD Templates for build,test,deploy to your infra☆12Aug 15, 2024Updated last year
- Documentation of vmc☆16Mar 4, 2025Updated last year
- The vulnerability management guide should help to breakdown vulnerability management process into a manageable repeatable cycles tailored…☆16Jul 23, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A repository for cybersecurity students☆41Feb 24, 2024Updated 2 years ago
- Linux SocketCAN kernel module for the CANalyst II USB CAN adapter☆12Jun 10, 2019Updated 6 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Jul 28, 2016Updated 9 years ago
- Recon for Department of Defense HackerOne program☆47Sep 27, 2018Updated 7 years ago
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- List Security Guide☆19Feb 24, 2021Updated 5 years ago
- Class materials for DevSecOps Live Lesson☆15Jun 19, 2022Updated 3 years ago