HadessCS / Delta
LLM Vulnerable Application
☆11Updated last year
Alternatives and similar repositories for Delta:
Users that are interested in Delta are comparing it to the libraries listed below
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Updated 4 years ago
- Ffuf output browser☆39Updated 2 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆11Updated last year
- Write-Ups for TryHackMe☆22Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 10 months ago
- Attempt zone transfers on domains☆17Updated 3 years ago
- S3 bucket enumerator☆29Updated 6 years ago
- WebSocket Connection Smuggler☆45Updated 2 years ago
- Validate proxies for specific domain☆36Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆16Updated 7 years ago
- Gampung tools for find nuclei template from github☆10Updated last year
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Simple tools to handle string and generate subdomain permutations☆15Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- ☆29Updated 2 years ago
- Backend for Nuclear Pond☆21Updated last year
- A simple tool which makes creating nuclei templates even easier.☆36Updated 10 months ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆17Updated 3 months ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆59Updated 5 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago