OWASP / TimeGap-TheoryLinks
An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities
☆21Updated 5 years ago
Alternatives and similar repositories for TimeGap-Theory
Users that are interested in TimeGap-Theory are comparing it to the libraries listed below
Sorting:
- Tools for auditing WAFS☆19Updated 3 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 2 months ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Updated 8 years ago
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 6 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12Updated 3 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- A Platform for Testing Secure Coding/Config☆19Updated 7 years ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Dependency Combobulator☆95Updated 2 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 6 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆109Updated 6 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Burp Extension for AWS Signing☆90Updated last year
- Training scenarios for cyber ranges☆13Updated 5 years ago
- security related events, tools, tutorials, cheatsheets, and more.☆11Updated 10 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- A small webserver vulnerable to insecure deserialization☆20Updated 8 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Some of the presentations given by me☆19Updated 5 months ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆47Updated 2 weeks ago