EdOverflow / cryptojourney-contentLinks
Learn the basics of cryptography throughout history.
☆21Updated 4 years ago
Alternatives and similar repositories for cryptojourney-content
Users that are interested in cryptojourney-content are comparing it to the libraries listed below
Sorting:
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- Amazon S3 bucket spelunking!☆87Updated 8 years ago
- Guidelines for writing secure code for Python developers.☆22Updated 8 years ago
- Scans packages in npm and pypi for secrets☆31Updated 6 years ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆110Updated 3 months ago
- Scans crossdomain.xml policies for expired domain names.☆26Updated 10 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Updated 6 years ago
- PHP tool to test XSS☆22Updated 6 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- API testing tool written with Python☆56Updated 8 years ago
- A formula to calculate bounty amounts.☆15Updated 8 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 5 years ago
- A bash script that fetches and maintains thousands of DNS resolvers☆65Updated 5 years ago
- Tools to gather subdomains from Bug Bounty programs☆65Updated 7 years ago
- A tool for enumerating expired domains in CNAME records☆60Updated 9 years ago
- Simple XXE test suite generated specifically for SAML interfaces☆22Updated 7 years ago
- Asynchronous wordlist based DKIM scanner☆58Updated 4 years ago
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Updated 6 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆73Updated 6 years ago
- Dynamic DNS Update Bruteforce Tool☆29Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- A tool to evaluate Content Security Policies.☆71Updated 5 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Updated 3 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Updated 6 years ago
- OAuth Security Cheatsheet☆41Updated 11 years ago