Simpsonpt / AppSecEzine
AppSec Ezine Public Repository.
☆1,165Updated this week
Alternatives and similar repositories for AppSecEzine
Users that are interested in AppSecEzine are comparing it to the libraries listed below
Sorting:
- A curated list of amazingly awesome Burp Extensions☆3,173Updated 2 months ago
- Awesome Vulnerable Applications☆1,170Updated 9 months ago
- ☆1,694Updated last week
- grep rough audit - source code auditing tool☆1,605Updated 3 weeks ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,682Updated 7 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,817Updated 7 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,787Updated 3 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,159Updated 2 years ago
- The Bug Hunters Methodology☆4,055Updated last year
- List of Awesome Asset Discovery Resources☆2,126Updated 3 months ago
- ☆1,002Updated 3 years ago
- XSS payloads designed to turn alert(1) into P1☆1,362Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,261Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆5,482Updated 9 months ago
- This script is intended to automate your reconnaissance process in an organized fashion☆1,959Updated 3 years ago
- Notes about attacking Jenkins servers☆2,055Updated 10 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,533Updated 8 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,213Updated 7 months ago
- Convolutional neural network for analyzing pentest screenshots☆1,195Updated last year
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,245Updated 3 weeks ago
- A DNS rebinding attack framework.☆1,098Updated last week
- Subdomain Takeover tool written in Go☆1,969Updated last year
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆737Updated 3 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,147Updated 3 months ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆883Updated 4 months ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,522Updated 2 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,408Updated 4 months ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,206Updated 3 months ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆1,342Updated 2 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,594Updated 6 months ago