OWASP / TimeGap-Theory
An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities
☆20Updated 4 years ago
Alternatives and similar repositories for TimeGap-Theory
Users that are interested in TimeGap-Theory are comparing it to the libraries listed below
Sorting:
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 4 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- An information gathering tool to collect git emails in version control host services☆11Updated 6 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Burp Suite extension for Radamsa-powered fuzzing with Intruder☆20Updated 3 years ago
- ☆17Updated 6 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- PoC: Python package static and dynamic analysis to detect environment variable stealing☆10Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12Updated 2 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- OWASP Threat Dragon with Gitlab Integration☆26Updated 7 years ago
- Python Package for burprestapi☆16Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- ☆10Updated 3 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆13Updated 6 months ago
- A Security Scanner for Go☆26Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago