zilbonn / OWASP-WSTG-RagLinks
OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code
☆16Updated 3 weeks ago
Alternatives and similar repositories for OWASP-WSTG-Rag
Users that are interested in OWASP-WSTG-Rag are comparing it to the libraries listed below
Sorting:
- using ML models for red teaming☆45Updated 2 years ago
- AI Powered Sensitive Information Detection☆20Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- Covert data exfiltration via DNS☆50Updated 10 months ago
- A National Vulnerability Database (NVD) API query tool☆17Updated 2 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Updated 3 years ago
- ☆27Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated 3 weeks ago
- Manage attack surface data on Elasticsearch☆23Updated 2 years ago
- One line command and control backdoors for APIs and web applications.☆51Updated last year
- ☆116Updated 2 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 5 months ago
- ☆16Updated 4 months ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- self-hosted Azure OSINT tool☆31Updated 6 months ago
- ☆80Updated 2 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆54Updated 7 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- PoC☆12Updated 8 months ago
- ☆71Updated 3 weeks ago
- ☆82Updated last month
- ☆19Updated 8 months ago
- Java archive implant toolkit.☆61Updated 8 months ago
- Cloud Exploit Framework☆114Updated 3 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year