AnubisSec / GroovyWaiterLinks
☆17Updated 3 years ago
Alternatives and similar repositories for GroovyWaiter
Users that are interested in GroovyWaiter are comparing it to the libraries listed below
Sorting:
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 7 months ago
- ☆90Updated 3 years ago
- ☆112Updated 2 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- ☆50Updated last year
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- ☆39Updated last year
- An extension to use Semgrep inside Burp Suite.☆89Updated 3 months ago
- WAF bypass PoC☆48Updated last year
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆53Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆116Updated 2 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆137Updated 5 months ago
- ☆60Updated 2 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆33Updated 2 years ago
- Additional active scan checks for BURP☆28Updated 11 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated last year
- ☆57Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated 11 months ago
- Dependency Confusion Security Testing Tool☆49Updated 3 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 6 months ago
- Collection of Semgrep rules for security analysis☆10Updated last year