zilbonn / OWASP-WSTG-RagLinks
OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code
☆17Updated last month
Alternatives and similar repositories for OWASP-WSTG-Rag
Users that are interested in OWASP-WSTG-Rag are comparing it to the libraries listed below
Sorting:
- Verizon Burp Extensions: AI Suite☆142Updated 9 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- using ML models for red teaming☆45Updated 2 years ago
- AI Powered Sensitive Information Detection☆20Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- ☆80Updated 2 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆44Updated last year
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Updated 3 years ago
- Some of my rough notes for Docker threat detection☆49Updated 2 years ago
- A National Vulnerability Database (NVD) API query tool☆17Updated 2 years ago
- Covert data exfiltration via DNS☆51Updated 11 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated 2 months ago
- self-hosted Azure OSINT tool☆32Updated 7 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- Hijack a slack bot to phish your way in☆57Updated 6 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Detonate malware on VMs and get logs & detection status☆76Updated last week
- ☆116Updated 2 years ago
- Manage attack surface data on Elasticsearch☆23Updated 2 years ago
- ☆89Updated 2 months ago
- ☆20Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 8 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 6 months ago
- An Evil OIDC Server☆54Updated 3 years ago
- Dynamic Labs is an open source tool aimed at red teamers and pentesters for the quick deployment of flexible, transient and cloud-hosted …☆63Updated 2 years ago
- Find what egress ports are allowed☆46Updated 2 months ago
- ☆27Updated 2 years ago
- Cloud Exploit Framework☆113Updated 3 years ago