Flash is an AI-driven code vulnerability scanner designed to assist developers and cybersecurity professionals in identifying security flaws in their code. By leveraging OpenAI's and Azure's AI models, Flash provides detailed analyses of potential vulnerabilities such as SQL injection, XSS, CSRF, and insecure file handling, among others.
☆33May 18, 2025Updated 10 months ago
Alternatives and similar repositories for Flash
Users that are interested in Flash are comparing it to the libraries listed below
Sorting:
- A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly☆18Oct 7, 2015Updated 10 years ago
- Auto powerful subdomains scanner - Auto check live subdomains☆18Jul 5, 2020Updated 5 years ago
- Like DLP☆11Jan 27, 2025Updated last year
- Web2 Peer2Peer Library reference implementation☆21Updated this week
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- ☆17May 20, 2021Updated 4 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Oct 26, 2021Updated 4 years ago
- ☆18May 18, 2025Updated 10 months ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Smart table using vue.js - sorting columns, filter by string, child rows, custom columns, custom row data☆14Feb 7, 2018Updated 8 years ago
- Bug bounty bot for channel☆16Dec 10, 2022Updated 3 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- ☆25Feb 10, 2026Updated last month
- PoC's and Slides from 'Gophers, whales and.. clouds? Oh my!' BSides Wellington presentation by Glenn 'devalias' Grant☆17Mar 3, 2018Updated 8 years ago
- Simple Script to install recommended Bug Bounty Hunting Tools In Your Linux Disto☆50Apr 27, 2021Updated 4 years ago
- ☆12Apr 18, 2024Updated last year
- ☆20Apr 8, 2023Updated 2 years ago
- In this repo the app is written in Kotlin compose and using realm local database and implementing clean architecture with multi-modules☆14Jul 17, 2024Updated last year
- ☆11May 25, 2021Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- Basic cURL command - cURL cheat sheet☆37Nov 24, 2022Updated 3 years ago
- ☆63Jul 14, 2025Updated 8 months ago
- ☆15Jan 8, 2020Updated 6 years ago
- Python package dependency confusion vulnerability POC. Impact this vulnerability is Remote code execution (RCE)☆12Apr 29, 2025Updated 10 months ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 5 months ago
- ☆33Sep 21, 2024Updated last year
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Dec 22, 2021Updated 4 years ago
- Intro To CTF In Arabic☆17Aug 3, 2020Updated 5 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 10 months ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆33Jul 13, 2025Updated 8 months ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆14Sep 17, 2025Updated 6 months ago
- A command-line whois - like client for the WHOIS and WHOIS History APIs by WhoisXML API Inc.☆19Feb 9, 2022Updated 4 years ago
- A API to watch movies, anime, web series, and TV shows.☆11Oct 16, 2023Updated 2 years ago
- This is a tool that helps x86 Android emulators like NOX and LDPlayer select cameras☆19Oct 13, 2024Updated last year
- Recon Automation☆11Sep 14, 2024Updated last year
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆38Jul 28, 2025Updated 7 months ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆83Jun 11, 2025Updated 9 months ago