SpiderLabs / CryptOMG
CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.
☆193Updated 9 years ago
Alternatives and similar repositories for CryptOMG:
Users that are interested in CryptOMG are comparing it to the libraries listed below
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆168Updated 8 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆254Updated 8 months ago
- Database of websites for penetration testing☆174Updated 5 years ago
- ☆122Updated 6 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆121Updated 6 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- Files for appsecwiki.com☆117Updated 4 years ago
- A collection of web pages, vulnerable to command injection flaws.☆177Updated last year
- Project "Flashbang" - An open-source Flash-security helper☆205Updated 9 years ago
- Notes/Tools for pentesting☆82Updated last year
- Web Application Security☆125Updated 8 months ago
- scripts for pentesting☆88Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Tool to help identify timing attacks☆69Updated 13 years ago
- Dirbuster plugin for Burp Suite☆70Updated 7 years ago
- Damn Vulnerable eXtensive Training Environment☆103Updated 2 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆82Updated 7 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆242Updated 10 years ago
- ☆232Updated 9 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆112Updated 4 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- Local File Inclusion Exploitation Tool (mirror)☆123Updated 8 years ago
- PoC implementation of the POODLE attack☆69Updated 9 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆138Updated 4 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆75Updated 6 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆164Updated last year
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Updated 7 years ago
- Linux post exploitation enumeration and exploit checking tools☆179Updated 4 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 11 years ago
- Common Findings Database☆100Updated 5 years ago