OlivierLaflamme / Auditing-VulnerabilitiesView external linksLinks
In this repository I'll host my research and methodologies for auditing vulnerabilities
☆29Jan 7, 2020Updated 6 years ago
Alternatives and similar repositories for Auditing-Vulnerabilities
Users that are interested in Auditing-Vulnerabilities are comparing it to the libraries listed below
Sorting:
- ☆10Sep 24, 2021Updated 4 years ago
- My configs, tools and what not. For everytime that I blow up my vm....☆18Jan 21, 2020Updated 6 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63May 19, 2023Updated 2 years ago
- ☆13Jun 27, 2022Updated 3 years ago
- ☆10May 12, 2017Updated 8 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Computer Science (data structures, algorithms), challenges solutions from LeetCode, Advent Of Code, Project Euler etc.☆12Oct 25, 2025Updated 3 months ago
- ☆11Mar 9, 2016Updated 9 years ago
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆16Oct 1, 2023Updated 2 years ago
- ☆16May 26, 2021Updated 4 years ago
- ☆18Jun 26, 2017Updated 8 years ago
- A tampered payload generator to Fuzz Web Application Firewalls☆34Nov 4, 2019Updated 6 years ago
- Subdomain discovery using Sublist3r, certspotter, crt.sh , censys and amass . Subdomain bruteforcing using Gobuster and Resolve hosts usi…☆16Oct 8, 2024Updated last year
- Send controlled amount of bytes, send msf-pattern, calculate offset, custom buffer, badcharacters all in one.☆15Apr 20, 2024Updated last year
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆40May 21, 2021Updated 4 years ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Sep 8, 2021Updated 4 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- Scans tcl for command injection☆17Mar 8, 2020Updated 5 years ago
- public dns server list for dmut project☆18Nov 30, 2023Updated 2 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago
- ☆18Aug 20, 2017Updated 8 years ago
- ☆20Aug 19, 2024Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Feb 8, 2025Updated last year
- An HTTP request smuggling scanner designed to work at scale☆24Oct 2, 2022Updated 3 years ago
- Wordlist to get files/ folders listed by the app that may expose passwords, sensitive file or folders☆22Jul 10, 2020Updated 5 years ago
- General research for Dreadnode☆27Jun 17, 2024Updated last year
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- Scapy Penetration testing scripts☆21May 26, 2015Updated 10 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated last month
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆155Nov 24, 2023Updated 2 years ago
- HTTP fuzzer engine security oriented☆60Feb 7, 2026Updated last week
- ☆63Jul 9, 2023Updated 2 years ago
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- ☆27Sep 15, 2022Updated 3 years ago
- POC in order to materialize CSRF prevention concepts described in the following OWASP CSRF cheatsheet☆30May 25, 2017Updated 8 years ago