GoSecure / presentations
Material from presentations done by GoSecure researchers
☆35Updated last year
Alternatives and similar repositories for presentations:
Users that are interested in presentations are comparing it to the libraries listed below
- Burp extension for quickly copying request/response data.☆29Updated 4 months ago
- ☆15Updated 3 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 4 years ago
- Anonymize your hashcat formatted files for online cracking☆28Updated 3 months ago
- A tool to evaluate Content Security Policies.☆70Updated 4 years ago
- A compilation of network scanning strategies to find vulnerable devices☆74Updated 2 years ago
- A collective list of public JSON APIs for use in security. Contributions welcome☆24Updated 4 years ago
- ☆37Updated 3 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 4 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆13Updated last year
- A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes …☆35Updated this week
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- multiple password 'asher using Python’s hashlib☆14Updated 3 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- learning case to prepare OSWE☆37Updated 5 years ago
- ☆27Updated 5 years ago
- DNS File EXfiltration☆46Updated 10 months ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Updated 2 years ago
- ☆65Updated 6 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- ☆17Updated 2 years ago
- AWS Security Checks☆36Updated 7 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Updated 5 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 3 years ago