☆20Jan 12, 2022Updated 4 years ago
Alternatives and similar repositories for pentesting-ibm-cloud
Users that are interested in pentesting-ibm-cloud are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Mar 31, 2021Updated 4 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- Minimalist cheat sheet for developpers to write secure code☆54Jul 17, 2020Updated 5 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Oh My Pentest Report is a customizable Oh My Zsh theme designed for pentesters.☆21Feb 17, 2026Updated last month
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- A research project to crawl and analyze Top 1 million domains☆24Feb 7, 2023Updated 3 years ago
- ☆26Mar 3, 2022Updated 4 years ago
- ☆20Oct 14, 2013Updated 12 years ago
- TSLint rules for Angular☆18Nov 30, 2018Updated 7 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- ☆56Jan 16, 2025Updated last year
- OAuth plugin for Burp Suite Extender☆43Jun 27, 2018Updated 7 years ago
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 3 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- Terraform provider for Tines☆13Nov 13, 2025Updated 4 months ago
- One line command and control backdoors for APIs and web applications.☆51Apr 9, 2024Updated last year
- The original slurp source☆32Nov 25, 2018Updated 7 years ago
- CTF中Pwn的快速利用模板(包含awd pwn)☆28Oct 15, 2021Updated 4 years ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- Search Outlook's PST files for a specific search term☆16Oct 2, 2023Updated 2 years ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 5 years ago
- The dexdump tool☆17Dec 27, 2013Updated 12 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Cybersecurity Psychology Framework☆20Feb 22, 2026Updated last month
- Generate Steampipe AWS config files for an AWS Organization☆14Aug 18, 2025Updated 7 months ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆32Oct 11, 2020Updated 5 years ago
- HackerRank's Solutions☆10Apr 2, 2020Updated 5 years ago
- Django management commands that log the running / status / output to a database☆15Jan 6, 2026Updated 2 months ago
- GraphQL application security testing helper☆20May 22, 2023Updated 2 years ago
- $ curl -sL sub.sh | bash☆17Aug 7, 2023Updated 2 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- IBM Cloud Functions building block - Message Hub Trigger - This project provides a starting point for handling events from Message Hub wi…☆11Apr 23, 2019Updated 6 years ago
- Sample Random GitHub Repositories☆12Dec 27, 2025Updated 2 months ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Archive of Potential Insider Threats☆153Sep 25, 2023Updated 2 years ago