A knowledge base of best practices for application security
☆30Aug 10, 2023Updated 2 years ago
Alternatives and similar repositories for application-security-handbook
Users that are interested in application-security-handbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Apr 6, 2024Updated 2 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated last year
- Insecure Android Application for testing Biometric bypasses☆15Aug 5, 2022Updated 3 years ago
- Files used for various testing methodologies.☆12Apr 15, 2026Updated 3 weeks ago
- ☆20Dec 14, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- Task management for small-group organizers.☆18Jul 23, 2022Updated 3 years ago
- A Kubernetes service reverse proxy that requires no configuration☆13Oct 4, 2015Updated 10 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 9 months ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- ☆19Jun 25, 2020Updated 5 years ago
- PoC of CVE-2022-22978 vulnerability in Spring Security framework☆12Jun 4, 2022Updated 3 years ago
- Tool to download IP ranges of CDN providers for bug bounties☆14Jul 24, 2024Updated last year
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- Chameleon Wordlists☆15Sep 13, 2022Updated 3 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 11 years ago
- Singer.io tap for extracting data from the Slack Web API☆12Dec 18, 2025Updated 4 months ago
- Find related domains of a given domain.☆105Aug 5, 2023Updated 2 years ago
- ☆10Feb 21, 2023Updated 3 years ago
- A tool to keep utility scripts neatly organized.☆14Jan 2, 2026Updated 4 months ago
- macOS/OSX hash dump script taken from Empire framework☆13Oct 19, 2018Updated 7 years ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Feb 26, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- 🧠 The CLI tool for learning commands from your terminal☆20Feb 27, 2022Updated 4 years ago
- Reconstruct javascript from a sourcemap in bash☆38Nov 23, 2021Updated 4 years ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 5 years ago
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated 2 years ago
- ☆21Mar 27, 2026Updated last month
- Labs from our workshop "Demystifying the server-side".☆17May 30, 2022Updated 3 years ago
- Docker image that provides features similar to Burp Collaborator☆15Mar 6, 2021Updated 5 years ago
- A mempool listener for contract specific transactions.☆13Aug 19, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- ☆24May 31, 2024Updated last year
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆12Apr 20, 2023Updated 3 years ago
- ☆28Feb 23, 2023Updated 3 years ago
- ☆18Sep 29, 2023Updated 2 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- SryRMS helps you in installing some popular proprietary as well as libre applications not available in the official repositories of Ubunt…☆14Jul 31, 2024Updated last year