LewisArdern / ConferenceTalks
☆35Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for ConferenceTalks
- An invoice management application built on the MEAN stack with intentional vulnerabilities used to demonstrate insecure configurations an…☆16Updated 4 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated last year
- HTML5 Training material for Attack and Secure training sessions.☆43Updated last year
- TSLint rules for Angular☆18Updated 5 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Updated last year
- Kubernetes Security Testing Guide☆26Updated 6 months ago
- eslintrc.js config files for running static analysis on JavaScript to identify security issues.☆62Updated 4 years ago
- Tools to gather subdomains from Bug Bounty programs☆63Updated 6 years ago
- Reverse engineers GQL Schema and generates template payloads☆45Updated 5 years ago
- Open Security Summit 2019☆25Updated 4 years ago
- Burp as a Docker Container☆59Updated 4 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 5 years ago
- Burp Suite extension to help make Graphql request more readable☆30Updated 6 years ago
- Actarus is a custom tool for bug bounty☆75Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 4 years ago
- Manual JavaScript Linting is a Bug☆49Updated 3 years ago
- Curated list of public penetration testing reports released by several consulting firms☆47Updated 6 years ago
- Tools used for Penetration testing / Red Teaming☆65Updated 5 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Updated 4 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 4 years ago
- retrive metadata endpoint data with these one liners.☆37Updated 4 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆110Updated 5 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆17Updated 5 years ago
- ☆12Updated 7 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆61Updated last year
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 2 years ago