OWASP / TimeGap-Theory
An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities
☆19Updated 4 years ago
Alternatives and similar repositories for TimeGap-Theory:
Users that are interested in TimeGap-Theory are comparing it to the libraries listed below
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆18Updated 5 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- Tools for auditing WAFS☆19Updated 2 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 6 years ago
- Scan blob files for sensitive content☆11Updated 2 years ago
- ☆10Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- ☆17Updated 6 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 6 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago