JavierOlmedo / OWASP-CalculatorView external linksLinks
🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment
☆163Aug 9, 2021Updated 4 years ago
Alternatives and similar repositories for OWASP-Calculator
Users that are interested in OWASP-Calculator are comparing it to the libraries listed below
Sorting:
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Jun 1, 2023Updated 2 years ago
- simple code directory brute☆17Feb 26, 2021Updated 4 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- ☆22Apr 12, 2023Updated 2 years ago
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆60Dec 31, 2022Updated 3 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 5 years ago
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.☆16Mar 18, 2021Updated 4 years ago
- A modular OSINT honeypot for blue teamers☆342May 2, 2023Updated 2 years ago
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 2 months ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆289Jun 3, 2022Updated 3 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Jun 5, 2023Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33May 18, 2022Updated 3 years ago
- ☆21May 1, 2021Updated 4 years ago
- ☆16Jul 19, 2021Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- ip-keyloger☆10Jan 9, 2026Updated last month
- [EN] BETA: Layla - recon tool for bug bounty☆75Feb 9, 2022Updated 4 years ago
- ASYRV es una aplicación escrita en PHP/MySQL, con Servicios Web mal desarrollados(SOAP/REST/XML), esperando ayudar a los entusiastas de l…☆23Oct 13, 2018Updated 7 years ago
- ATTPwn☆216Mar 9, 2024Updated last year
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆277Jan 14, 2023Updated 3 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- ☆24Oct 31, 2023Updated 2 years ago
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python …☆24Aug 29, 2021Updated 4 years ago
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- Fuzzinglabs's audits, publications, workshops and reports☆29May 9, 2025Updated 9 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Nov 22, 2021Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- ☆10Mar 2, 2019Updated 6 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- ☆11Nov 5, 2022Updated 3 years ago
- The Software Parts (SParts) lab delivers a Sawtooth-based ledger that provides both accountability and access to the open source componen…☆12Feb 20, 2020Updated 5 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago