0xn3va / application-security-handbookLinks
A knowledge base of best practices for application security
☆28Updated 2 years ago
Alternatives and similar repositories for application-security-handbook
Users that are interested in application-security-handbook are comparing it to the libraries listed below
Sorting:
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆244Updated 2 years ago
- A research project to add some brrrrrr to Burp☆194Updated 9 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆146Updated 7 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆305Updated 3 months ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆236Updated last year
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆94Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆227Updated last week
- ☆183Updated last year
- The Template Injection Playground allows to test a large number of the most relevant template engines for template injection possibilitie…☆53Updated 4 months ago
- A Broken Application - Very Vulnerable!☆175Updated last week
- Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities.☆221Updated 4 months ago
- Repository to house markdown templates for researchers☆209Updated last month
- ai-based domain name generation☆97Updated 9 months ago
- A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representati…☆93Updated 2 years ago
- ☆218Updated last year
- ☆106Updated last year
- ☆203Updated last year
- Secrets scanner that understands code☆191Updated 2 years ago
- jxscout superpowers JavaScript analysis for security researchers☆302Updated 2 months ago
- A collection of Turbo Intruder scripts.☆66Updated 9 months ago
- ☆82Updated 2 years ago
- Finds graphql queries in javascript files☆65Updated last year
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆371Updated last year
- Self-hosted bug bounty programs that are "scammy" or unethical☆148Updated 3 weeks ago
- Distribute ordinary bash commands over many systems☆167Updated 3 years ago
- ☆340Updated 5 months ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆80Updated 2 years ago
- The Arcanum Prompt Injection Taxonomy☆322Updated 3 months ago
- Chrome extension for automating CSPT discovery☆120Updated 5 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆383Updated 4 months ago