All Projects → Resources-for-Application-Security → Similar Projects or Alternatives

832 Open source projects that are alternatives of or similar to Resources-for-Application-Security

Prismatica
Responsive Command and Control System
Stars: ✭ 81 (-16.49%)
Mutual labels:  infosec
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-25.77%)
Mutual labels:  owasp
heaptrace
helps visualize heap operations for pwn and debugging
Stars: ✭ 252 (+159.79%)
Mutual labels:  ctf
Credsleaker
Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
Stars: ✭ 247 (+154.64%)
Mutual labels:  infosec
Owasp Seraphimdroid
OWASP Seraphimdroid is an open source project with aim to create, as a community, an open platform for education and protection of Android users against privacy and security threats.
Stars: ✭ 62 (-36.08%)
Mutual labels:  owasp
game-of-thrones-hacking-ctf
Game of Thrones hacking CTF (Capture the flag)
Stars: ✭ 57 (-41.24%)
Mutual labels:  ctf
bctf2017
bctf2017 challenges
Stars: ✭ 11 (-88.66%)
Mutual labels:  ctf
solutions-bwapp
In progress rough solutions to bWAPP / bee-box
Stars: ✭ 158 (+62.89%)
Mutual labels:  appsec
cwe-tool
A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.
Stars: ✭ 40 (-58.76%)
Mutual labels:  owasp
Keydecoder
KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.
Stars: ✭ 236 (+143.3%)
Mutual labels:  infosec
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1071.13%)
Mutual labels:  infosec
Breachdetector
Detect root, emulation, debug mode and other security concerns in your Xamarin apps
Stars: ✭ 57 (-41.24%)
Mutual labels:  owasp
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-36.08%)
Mutual labels:  infosec
hackergame2021-writeups
中国科学技术大学第八届信息安全大赛的官方与非官方题解
Stars: ✭ 444 (+357.73%)
Mutual labels:  ctf
Lyricpass
Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
Stars: ✭ 58 (-40.21%)
Mutual labels:  infosec
Threat Dragon Desktop
Desktop variant of OWASP Threat Dragon
Stars: ✭ 53 (-45.36%)
Mutual labels:  owasp
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+1006.19%)
Mutual labels:  infosec
FSEC-VM
Backend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-80.41%)
Mutual labels:  infosec
Yeti
Your Everyday Threat Intelligence
Stars: ✭ 1,037 (+969.07%)
Mutual labels:  infosec
Nettacker
Automated Penetration Testing Framework
Stars: ✭ 982 (+912.37%)
Mutual labels:  owasp
Bug Bounty Responses
A collection of response templates for invalid bug bounty reports.
Stars: ✭ 46 (-52.58%)
Mutual labels:  infosec
raider
OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions
Stars: ✭ 88 (-9.28%)
Mutual labels:  owasp
Awesome Ethical Hacking Resources
🔗 All the resources I could find for learning Ethical Hacking and Penetration Testing.
Stars: ✭ 933 (+861.86%)
Mutual labels:  owasp
Malcom
Malcom - Malware Communications Analyzer
Stars: ✭ 988 (+918.56%)
Mutual labels:  infosec
writeups
Writeups for vulnerable machines.
Stars: ✭ 110 (+13.4%)
Mutual labels:  ctf
Checkmyhttps
We propose a user-friendly add-on that allows you to check if your encrypted web traffic (SSL/TLS) towards secured Internet servers (HTTPS) is not intercepted (being listened to).
Stars: ✭ 35 (-63.92%)
Mutual labels:  infosec
Threat Dragon Core
OWASP Threat Dragon core files
Stars: ✭ 24 (-75.26%)
Mutual labels:  owasp
polscan
Zero-setup SSH-based scanner with extensive visualizations for Debian server inventory, policy compliance and vulnerabilities
Stars: ✭ 57 (-41.24%)
Mutual labels:  infosec
Joomscan
OWASP Joomla Vulnerability Scanner Project
Stars: ✭ 640 (+559.79%)
Mutual labels:  owasp
Metta
An information security preparedness tool to do adversarial simulation.
Stars: ✭ 867 (+793.81%)
Mutual labels:  infosec
OversecuredVulnerableiOSApp
Oversecured Vulnerable iOS App
Stars: ✭ 138 (+42.27%)
Mutual labels:  appsec
Changeme
A default credential scanner.
Stars: ✭ 928 (+856.7%)
Mutual labels:  infosec
Amass
In-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+6378.35%)
Mutual labels:  owasp
Vuldash
Vulnerability Dashboard
Stars: ✭ 16 (-83.51%)
Mutual labels:  infosec
penelope
Penelope Shell Handler
Stars: ✭ 291 (+200%)
Mutual labels:  ctf
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+698.97%)
Mutual labels:  infosec
Owasp Web Checklist
OWASP Web Application Security Testing Checklist
Stars: ✭ 543 (+459.79%)
Mutual labels:  owasp
Gourdscanv2
被动式漏洞扫描系统
Stars: ✭ 740 (+662.89%)
Mutual labels:  infosec
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+205.15%)
Mutual labels:  infosec
Bashfuscator
A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
Stars: ✭ 690 (+611.34%)
Mutual labels:  infosec
Kubestriker
A Blazing fast Security Auditing tool for Kubernetes
Stars: ✭ 213 (+119.59%)
Mutual labels:  infosec
awesome-api-security
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
Stars: ✭ 2,079 (+2043.3%)
Mutual labels:  infosec
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+2760.82%)
Mutual labels:  infosec
Fame
FAME Automates Malware Evaluation
Stars: ✭ 663 (+583.51%)
Mutual labels:  infosec
Autosqli
An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.
Stars: ✭ 222 (+128.87%)
Mutual labels:  infosec
ghidra2dwarf
🐉 Export ghidra decompiled code to dwarf sections inside ELF binary
Stars: ✭ 135 (+39.18%)
Mutual labels:  ctf
crAPI
completely ridiculous API (crAPI)
Stars: ✭ 549 (+465.98%)
Mutual labels:  owasp
My CTF Challenges
🔥☀️
Stars: ✭ 55 (-43.3%)
Mutual labels:  ctf
Sec Admin
分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (+128.87%)
Mutual labels:  infosec
Magento Malware Scanner
Scanner, signatures and the largest collection of Magento malware
Stars: ✭ 608 (+526.8%)
Mutual labels:  infosec
Dvna
Damn Vulnerable NodeJS Application
Stars: ✭ 463 (+377.32%)
Mutual labels:  owasp
Esfileexploreropenportvuln
ES File Explorer Open Port Vulnerability - CVE-2019-6447
Stars: ✭ 595 (+513.4%)
Mutual labels:  infosec
mod csrfprotector
apache 2.x.x module, for CSRF mitigation
Stars: ✭ 20 (-79.38%)
Mutual labels:  owasp
Ronin
Ronin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits or Payloads, Scanners, etc, via Repositories.
Stars: ✭ 220 (+126.8%)
Mutual labels:  infosec
SSI Extra Materials
In my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (-56.7%)
Mutual labels:  appsec
Contact.sh
An OSINT tool to find contacts in order to report security vulnerabilities.
Stars: ✭ 216 (+122.68%)
Mutual labels:  infosec
Can I Take Over Xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Stars: ✭ 2,808 (+2794.85%)
Mutual labels:  infosec
S3Scan
Script to spider a website and find publicly open S3 buckets
Stars: ✭ 21 (-78.35%)
Mutual labels:  infosec
react-obfuscate
An intelligent React component to obfuscate any contact link!
Stars: ✭ 87 (-10.31%)
Mutual labels:  infosec
flydns
Related subdomains finder
Stars: ✭ 29 (-70.1%)
Mutual labels:  infosec
301-360 of 832 similar projects