Burp Plugin for Contrast Security
☆16Oct 8, 2025Updated 4 months ago
Alternatives and similar repositories for Burptrast
Users that are interested in Burptrast are comparing it to the libraries listed below
Sorting:
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- ☆20Sep 26, 2019Updated 6 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- MCP Server for Contrast Security☆16Jan 26, 2026Updated last month
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- Secure access cloud terraform provider☆13Feb 24, 2026Updated last week
- Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning …☆42Oct 8, 2025Updated 4 months ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- ☆11Apr 15, 2021Updated 4 years ago
- Tiny Flask app for testing HTTP calls☆11Aug 7, 2018Updated 7 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13May 4, 2020Updated 5 years ago
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 10 months ago
- ☆12May 6, 2021Updated 4 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated 11 months ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- ☆10Jun 30, 2016Updated 9 years ago
- ☆12Mar 14, 2022Updated 3 years ago
- ☆10Jul 6, 2016Updated 9 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- Attaches your (public) SSH key to your GitHub account☆11Feb 6, 2016Updated 10 years ago
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 25, 2026Updated last week
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- Pentest Q&A trick written in Vietnamese☆11May 16, 2019Updated 6 years ago
- Protocol Designer allows you to design network protocols interactively.☆16Feb 6, 2026Updated 3 weeks ago
- Jenkins Plugin from Contrast Security☆13Aug 9, 2024Updated last year
- Contains function and feature extensions, code examples, and utilities for JumpCloud, including automated user import, CSV import, and ot…☆14Mar 8, 2016Updated 9 years ago
- Lockheed Martin developed utility to combine multiple CycloneDX SBOMs☆13Jan 16, 2023Updated 3 years ago
- WIP: A set of policies based on Catalyze.io's open sourced and vetted policies for HIPPA compliance.☆13Dec 26, 2014Updated 11 years ago
- A collection of Security Bookmarks☆11Oct 9, 2021Updated 4 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- ACT☆12Sep 8, 2025Updated 5 months ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- ☆12Jun 24, 2021Updated 4 years ago
- Inspec resources for AWS☆10Feb 20, 2018Updated 8 years ago
- ***MERGED: SEE README:*** The XCCDF to InSpec parser scans and extracts the controls defined in the DISA XCCDF STIG XML documents and con…☆12Nov 23, 2018Updated 7 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago