OWASP / CodeReviewGuideLinks
Repository for OWASP Code Review document
☆16Updated 10 years ago
Alternatives and similar repositories for CodeReviewGuide
Users that are interested in CodeReviewGuide are comparing it to the libraries listed below
Sorting:
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- ☆13Updated 8 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆43Updated 11 months ago
- ☆15Updated 4 years ago
- This is a container of web applications that work with OWASP Bug Bounty for Projects☆32Updated last month
- A framework for automating penetration testing using a plugin based architecture☆38Updated 3 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 5 years ago
- ☆25Updated 4 years ago
- ☆13Updated 7 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- .NET ASP.NET Security Analyser - Consolidation of multiple ASP.NET OWASP tools☆16Updated 10 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Updated 5 years ago
- Open Security Summit 2019☆26Updated 4 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Deliberately vulnerable web application☆22Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 6 years ago