🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment
☆162Aug 9, 2021Updated 4 years ago
Alternatives and similar repositories for OWASP-Calculator
Users that are interested in OWASP-Calculator are comparing it to the libraries listed below
Sorting:
- simple code directory brute☆17Feb 26, 2021Updated 5 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- ☆22Apr 12, 2023Updated 2 years ago
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆59Dec 31, 2022Updated 3 years ago
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.☆16Mar 18, 2021Updated 4 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- A modular OSINT honeypot for blue teamers☆342May 2, 2023Updated 2 years ago
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 2 months ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆289Jun 3, 2022Updated 3 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Jun 5, 2023Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last week
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- ☆17Jul 19, 2021Updated 4 years ago
- ☆21May 1, 2021Updated 4 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- ip-keyloger☆10Jan 9, 2026Updated 2 months ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- ASYRV es una aplicación escrita en PHP/MySQL, con Servicios Web mal desarrollados(SOAP/REST/XML), esperando ayudar a los entusiastas de l…☆23Oct 13, 2018Updated 7 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆75Feb 9, 2022Updated 4 years ago
- ATTPwn☆217Mar 9, 2024Updated 2 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆278Jan 14, 2023Updated 3 years ago
- Fuzzinglabs's audits, publications, workshops and reports☆29May 9, 2025Updated 10 months ago
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- ☆24Oct 31, 2023Updated 2 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆23Nov 22, 2021Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- The Software Parts (SParts) lab delivers a Sawtooth-based ledger that provides both accountability and access to the open source componen…☆12Feb 20, 2020Updated 6 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- ☆11Nov 5, 2022Updated 3 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago