An HTTP Response fuzzer to find Vulnerabilities in Security Scanners
☆27Jun 18, 2024Updated last year
Alternatives and similar repositories for RevOK
Users that are interested in RevOK are comparing it to the libraries listed below
Sorting:
- OWASP WAP - Web Application Protection Project☆11Jul 24, 2019Updated 6 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆198Mar 6, 2024Updated last year
- Use Z3 to generate strings that match multiple regex | "The plural of regex is regrets"☆29Nov 18, 2023Updated 2 years ago
- Bytecode based Fuzzer for the PHP language☆12Jul 22, 2020Updated 5 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Mar 11, 2021Updated 4 years ago
- ☆16Dec 22, 2019Updated 6 years ago
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- ctf101 systems security repository☆26Jul 19, 2021Updated 4 years ago
- 阿里云先知社区xss挑战☆22Sep 17, 2017Updated 8 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated 2 weeks ago
- Automated Security Risk Identification Using AutomationML-based Engineering Data☆31Jul 24, 2022Updated 3 years ago
- Learn MongoDB from absolute basics.☆54Jan 16, 2026Updated last month
- Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications (NDSS 2022)☆27Feb 14, 2024Updated 2 years ago
- Pretty vulnerable flask app..☆22Oct 30, 2018Updated 7 years ago
- A web crawler written with pentesting in mind and some hacks for smart crawling☆29Apr 9, 2019Updated 6 years ago
- Testability Pattern Catalogs for SAST☆32Feb 18, 2025Updated last year
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- ☆39Updated this week
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 4 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆34Feb 17, 2021Updated 5 years ago
- CTF challenges I've written☆36Apr 20, 2023Updated 2 years ago
- WCTF2019 challenge: Gyotaku The Flag☆41Jul 13, 2019Updated 6 years ago
- Papers☆34Oct 29, 2019Updated 6 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆75May 23, 2020Updated 5 years ago
- Bot per leggere i livelli idrometrici dei fiumi dell'Emilia Romagna riportati da allertameteo.regione.emilia-romagna.it.☆12Feb 18, 2026Updated last week
- OWASP ASVS Security Evaluation Templates with Nuclei☆42Dec 2, 2025Updated 2 months ago
- Switch between two running operating systems without losing their state.☆53Jan 2, 2026Updated last month
- ☆11Jan 5, 2023Updated 3 years ago
- Venom 战队 2019 圣诞拼图挑战赛☆10Mar 27, 2023Updated 2 years ago
- SQLAlchemy bindings for WordPress☆13Oct 22, 2010Updated 15 years ago
- Bypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )☆32Nov 3, 2019Updated 6 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- Source code, descriptions and writeups of INS'hAck 2019 CTF challenges!☆33May 11, 2019Updated 6 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆37Feb 6, 2021Updated 5 years ago
- Challenge Sources & Exploits for the 34C3 CTF☆115Jan 5, 2018Updated 8 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- 🌀 an Interactive Terminal for AI (interminai) - A PTY proxy enabling AI interaction with interactive CLI applications like vim, git reba…☆44Feb 9, 2026Updated 2 weeks ago