OWASP Foundation Web Respository
☆19Dec 22, 2025Updated 2 months ago
Alternatives and similar repositories for www-project-pytm
Users that are interested in www-project-pytm are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆22Feb 27, 2026Updated last week
- OWASP Threat Dragon core files☆29May 15, 2021Updated 4 years ago
- The content that speakers want to share for TechBash 2019. Be sure to use #TechBash when posting in social media.☆10Dec 8, 2022Updated 3 years ago
- ☆10Feb 8, 2022Updated 4 years ago
- Bash-based recon automation script that orchestrates tools like Nmap, Dirsearch (Python), and crt.sh to perform port scanning, directory …☆15Jul 22, 2025Updated 7 months ago
- AWS CloudFormation templates for the blog post regarding Defense in Depth using AWS Managed Rules☆10Aug 17, 2020Updated 5 years ago
- ☆17Feb 3, 2026Updated last month
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- Agile Threat Modeling Toolkit☆727Nov 20, 2025Updated 3 months ago
- Sample code for a Cisco DNA Center Webhook Receiver☆13Apr 12, 2023Updated 2 years ago
- Technical discussion on background processing in PHP web applications with test code included.☆10Jul 28, 2018Updated 7 years ago
- Pop PHP Framework v1.7.0 : A Lightweight PHP Framework☆42Mar 7, 2016Updated 10 years ago
- ☆17Aug 16, 2023Updated 2 years ago
- Defines common cross-framework interfaces to represent HTTP requests and responses☆11Aug 9, 2022Updated 3 years ago
- Bright Nucleus Exceptions Component☆10Dec 12, 2024Updated last year
- Monte Carlo Tree Search (MCTS) Engine in Clojure/Clojurescript. Plays board games.☆10Mar 28, 2018Updated 7 years ago
- Tool to provision Microsoft identity platform applications and sync it with code configuration☆12Mar 5, 2021Updated 5 years ago
- ☆11May 12, 2019Updated 6 years ago
- Feedback Meeting☆12Jul 2, 2018Updated 7 years ago
- Sample demonstrating consuming Amazon Cognito Streams☆10Jun 15, 2020Updated 5 years ago
- A curated collection of security tools, frameworks, and resources for Enumeration, Cloud Security, Static Analysis, Threat Intelligence, …☆21Dec 2, 2025Updated 3 months ago
- An easy-to-read, quick reference for PHP best practices, accepted coding standards, and links to authoritative tutorials around the Web☆10Jul 23, 2012Updated 13 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- A very poor and very simple local face recognition search engine☆18Mar 23, 2024Updated last year
- Repo for quick AST transformation nonsense.☆13Nov 23, 2021Updated 4 years ago
- Nitrux is a simple, clean and minimal icon set with n^∞ icons that have been consistently designed to add the finishing touch to your des…☆10Jan 21, 2020Updated 6 years ago
- PHP class using a tracking-pixel and PDO/SQLite to track opened email☆12Dec 4, 2015Updated 10 years ago
- Where in the world is our team?☆12Jan 24, 2018Updated 8 years ago
- Maltego Transform Partner to Ghunt☆14Jan 10, 2025Updated last year
- PyTennessee 2016 Tutorial: Writing Command Line Applications that Click☆14May 11, 2016Updated 9 years ago
- Command-line tools for Atlas.☆14Dec 14, 2023Updated 2 years ago
- A threat modeling tool that implements the Trike v2 methodology in Smalltalk☆16Nov 18, 2019Updated 6 years ago
- My collection of Cloud Security Resources☆16Apr 16, 2025Updated 10 months ago
- library which resolves open-redirection vulnerability when we need to make redirection to a path taken from query string.☆15Sep 25, 2025Updated 5 months ago
- URL Map Stack middleware.☆45Jun 20, 2019Updated 6 years ago
- ☆14Feb 14, 2021Updated 5 years ago
- Code coverage startup for C++ project using GCov and LCov☆14Jun 4, 2021Updated 4 years ago
- Locally run Python 3.5+ Flask based application that provides HTTP POST simulations of Location Scanning, WebHook Alerts and Splash Page …☆11May 1, 2023Updated 2 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago