NeuronAddict / keycloak-scanner
Keycloak security scanner
☆51Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for keycloak-scanner
- LDAP Swiss Army Knife☆43Updated 11 months ago
- ☆22Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- Scan DockerHub images that match a keyword to find secrets.☆54Updated 3 years ago
- Damn Vulnerable Java (EE) Application☆130Updated 9 months ago
- A simple remote scanner for Liferay Portal☆18Updated last year
- Docker container escape enumeration tool.☆10Updated 3 years ago
- Provides a suite of Burp extensions and a maven plugin to automate security tests using BurpSuite.☆25Updated 6 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 4 years ago
- An Evil OIDC Server☆51Updated 2 years ago
- Highlighting different firefox containers in Burp Proxy☆11Updated 3 years ago
- ☆144Updated 2 years ago
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- BURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.☆63Updated 3 weeks ago
- ☆58Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆38Updated 3 years ago
- Dependency Combobulator☆88Updated 10 months ago
- A simple remote scanner for Atlassian Jira☆118Updated last year
- A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x "JNDI LDAP" vulnerability.☆71Updated 2 years ago
- ☆17Updated 2 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 3 years ago
- ☆125Updated 4 months ago
- This is a dockerized application that is vulnerable to the Spring4Shell vulnerability (CVE-2022-22965).☆105Updated 2 years ago
- A collection of my Semgrep rules☆47Updated last year
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆48Updated 2 years ago
- Grafana Labs bug bounty☆29Updated last month
- Vulnerable webapp testbed☆20Updated 8 years ago
- Burp with Friends☆99Updated last year
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆104Updated last year
- JWT Attack to change the algorithm RS256 to HS256☆32Updated last year