☆16May 21, 2019Updated 6 years ago
Alternatives and similar repositories for OWASP-Testing-Guide-v5
Users that are interested in OWASP-Testing-Guide-v5 are comparing it to the libraries listed below
Sorting:
- ☆15Mar 21, 2025Updated 11 months ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- A Splunker’s guide to containers☆12Dec 21, 2019Updated 6 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP To…☆12Jan 30, 2023Updated 3 years ago
- Heart-shaped flashlight PCB for Ariella☆13Sep 2, 2017Updated 8 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- ☆10Jun 26, 2017Updated 8 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 2 months ago
- Course topics & links for crypto & appsec course taught in 2021☆15Jun 28, 2021Updated 4 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Apr 9, 2019Updated 6 years ago
- This Repo clone and organize all nuclei templates that are found in Github. { due to git runner time limit stopped the workflow, ping me …☆12Feb 28, 2025Updated last year
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago
- A repository hosting some of my own vulnerability reports and proof-of-concepts.☆15Aug 8, 2019Updated 6 years ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- This app leverages the Adaptive Response framework to perform API calls to Security Trails☆15Feb 14, 2019Updated 7 years ago
- ☆13Aug 10, 2022Updated 3 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- bypass 401/403☆13Sep 13, 2022Updated 3 years ago
- Jekyll theme for documentation 📝 built with material web components☆10Updated this week
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- ☆13Jun 26, 2025Updated 8 months ago
- collectd☆11Feb 3, 2020Updated 6 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆13May 10, 2022Updated 3 years ago
- ☆11Feb 11, 2023Updated 3 years ago
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Various scripts I create while doing CTFs. May or may not be helpful :)☆15Dec 14, 2024Updated last year
- The Mac app that automatically sets your desktop background to pictures from Reddit☆11May 20, 2020Updated 5 years ago
- A shell script for running lightning talks with a cow as a compere.☆15Jun 5, 2020Updated 5 years ago
- DorkStorm is the perfect tool for discovering hidden information on the internet.☆14Feb 23, 2024Updated 2 years ago
- BPP hunting☆10Nov 10, 2024Updated last year
- Etherpad: real-time collaborative document editor☆10Mar 30, 2020Updated 5 years ago
- This repository maintains some of the scripts made by Ebryx DevSecOps team.☆12Dec 21, 2022Updated 3 years ago
- ☆11Jan 23, 2025Updated last year
- Fluentd input plugin which queries Kubernetes kubelet summary API to collect Kubernetes metrics.☆12Jun 25, 2025Updated 8 months ago
- ☆13Sep 8, 2024Updated last year