AnubisSec / GroovyWaiterLinks
☆17Updated 3 years ago
Alternatives and similar repositories for GroovyWaiter
Users that are interested in GroovyWaiter are comparing it to the libraries listed below
Sorting:
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated last year
- ☆90Updated 3 years ago
- ☆51Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- WAF bypass PoC☆50Updated 2 years ago
- ☆39Updated last year
- ☆60Updated 2 years ago
- ☆114Updated 2 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 8 months ago
- Determine privileges from cloud credentials via brute-force testing.☆68Updated last year
- Additional active scan checks for BURP☆28Updated last year
- ☆55Updated 2 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆34Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 4 years ago
- ☆24Updated 3 years ago
- Dependency Combobulator☆95Updated 2 years ago
- ☆10Updated 7 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆141Updated 3 months ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆36Updated 11 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- boostsecurityio/lotp☆138Updated 2 weeks ago