NeuronAddict / keycloak-scannerLinks
Keycloak security scanner
☆54Updated last year
Alternatives and similar repositories for keycloak-scanner
Users that are interested in keycloak-scanner are comparing it to the libraries listed below
Sorting:
- ☆23Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Highlighting different firefox containers in Burp Proxy☆12Updated 4 years ago
- Scan DockerHub images that match a keyword to find secrets.☆60Updated 4 years ago
- Find the remote website version based on a git repository☆125Updated 4 years ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- ☆106Updated 2 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆35Updated 2 weeks ago
- ☆104Updated 2 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated last year
- Damn Vulnerable Java (EE) Application☆141Updated last year
- Reconnaissance tool for GitLab and GitHub organizations☆49Updated last year
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago
- ☆90Updated 3 years ago
- Burp with Friends☆103Updated 2 years ago
- Dependency Confusion Security Testing Tool☆49Updated 3 years ago
- Tools to assess DNS security.☆152Updated last year
- Burp Suite Professional in a Docker container.☆83Updated 2 weeks ago
- A collection of my Semgrep rules☆49Updated 2 years ago
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- REST API backend for Reconmap☆47Updated this week
- A Burp Suite Extension for parsing Project Files from the CLI.☆87Updated 11 months ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated 2 weeks ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆43Updated last year
- An Evil OIDC Server☆53Updated 2 years ago
- ☆24Updated last year
- ☆36Updated 6 years ago
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆106Updated 2 years ago