zilbonn / OWASP-WSTG-RagLinks
OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code
☆17Updated last month
Alternatives and similar repositories for OWASP-WSTG-Rag
Users that are interested in OWASP-WSTG-Rag are comparing it to the libraries listed below
Sorting:
- using ML models for red teaming☆45Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Verizon Burp Extensions: AI Suite☆142Updated 9 months ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Updated 3 years ago
- ☆27Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- ☆20Updated 2 years ago
- ☆13Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- A National Vulnerability Database (NVD) API query tool☆17Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Cloud Exploit Framework☆113Updated 3 years ago
- Exploits Unauth Docker API☆43Updated 9 months ago
- Some of my rough notes for Docker threat detection☆49Updated 2 years ago
- self-hosted Azure OSINT tool☆32Updated 7 months ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- 2022 CTF public release☆23Updated 3 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Updated last year
- Tool to spray AWS Console IAM Logins☆35Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆68Updated last year
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- AI Powered Sensitive Information Detection☆20Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- ☆94Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Covert data exfiltration via DNS☆51Updated last year