ShiftLeftSecurity / shiftleft-java-demoLinks
☆10Updated last year
Alternatives and similar repositories for shiftleft-java-demo
Users that are interested in shiftleft-java-demo are comparing it to the libraries listed below
Sorting:
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆82Updated 3 years ago
- All Things Bug Bounty☆116Updated 3 years ago
- ☆173Updated 4 years ago
- GraphQL security workshop labs☆118Updated last week
- Detectify Crowdsource Challenge☆72Updated 3 years ago
- Guide to SSRF☆74Updated 2 years ago
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆85Updated 2 weeks ago
- This is where I share code/material shown in my videos☆76Updated 2 years ago
- A simple way of sending messages from the CLI output to your Slack with webhook.☆116Updated 2 years ago
- Bash Script to Hunt all the targets/Subdomains from Chaos by Project Discovery Team☆36Updated 5 years ago
- Most of the Google Acquisitions for Bug Bounty Hunter.☆64Updated 3 years ago
- Unofficial documentation for the great tool Param Miner☆184Updated 3 years ago
- A repository of some useful grep patterns for tomnomnoms gf tool☆38Updated 5 years ago
- Running nuclei Continuously☆57Updated 3 years ago
- A Python based scanner to find potential SSRF parameters in a web application.☆70Updated 4 years ago
- The project aims at creating target-specific wordlists for any web application that you are testing.☆67Updated 3 years ago
- GraphQL automatic fuzzing tool☆16Updated 4 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆185Updated 3 years ago
- DNS and Target HTTP History Local Storage and Search☆63Updated 4 years ago
- ☆52Updated 4 years ago
- ☆35Updated 5 years ago
- ☆21Updated 4 years ago
- Burp-suite Extension For finding .map files☆54Updated 2 years ago
- Some Tutorials and Things to Do while Hunting That Vulnerability.☆75Updated 5 years ago
- ☆56Updated 5 years ago
- A collection of useful grep patterns and tools by Tomnomnom for extracting specific values from text.☆48Updated 10 months ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆78Updated 6 years ago
- xss development frameworks, with the goal of making payload writing easier.☆152Updated last year
- Prototype Pollution - A detailed study + hands on lab.☆15Updated 3 years ago
- ☆57Updated 2 years ago