☆34Aug 13, 2021Updated 4 years ago
Alternatives and similar repositories for JOSEPH
Users that are interested in JOSEPH are comparing it to the libraries listed below
Sorting:
- a shared short domain for XSS and other hacks☆32Mar 3, 2022Updated 4 years ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- This repository will only hold issues around various Tools to be bundled in AndroidTamer☆12May 2, 2016Updated 9 years ago
- DupeKeyInjector☆134Apr 16, 2022Updated 3 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- ☆14Apr 23, 2019Updated 6 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- ☆14Apr 28, 2021Updated 4 years ago
- weblogic wls9-async 反序列利用图形版客户端 CNVD-C-2019-48814☆13May 9, 2019Updated 6 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- This is a Firefox WebExtension that monitors the browsing activity and automatically perform an automated XSS vulnerability scan by submi…☆18Jan 21, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 10 years ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- Credentials Checking Framework☆53Feb 8, 2023Updated 3 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- Chrome extension to aid in finding DOMXSS by simple taint analysis of string values.☆80Jun 1, 2019Updated 6 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- Vulnerable webapp testbed☆24May 11, 2016Updated 9 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆54Sep 14, 2023Updated 2 years ago
- Android File Fuzzing Framework☆87Jun 7, 2022Updated 3 years ago
- UI für verschiedene Reifegrad-Dimensionen☆32Dec 10, 2022Updated 3 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Jun 25, 2017Updated 8 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆97Jan 28, 2026Updated last month
- ☆29Feb 24, 2021Updated 5 years ago
- This repository contains the POC of an exploit for node-jose < 0.11.0☆25Feb 24, 2023Updated 3 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- ☆28Aug 6, 2020Updated 5 years ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago