☆12May 9, 2017Updated 8 years ago
Alternatives and similar repositories for AutoSec4WebApps
Users that are interested in AutoSec4WebApps are comparing it to the libraries listed below
Sorting:
- YAML data sources for metasploit.github.io☆20Apr 12, 2016Updated 9 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Oct 17, 2020Updated 5 years ago
- Disables ASLR flag IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE in IMAGE_OPTIONAL_HEADER on pre-compiled EXE. Works for both 32 and 64 bit Windo…☆20Jan 13, 2021Updated 5 years ago
- This is an automatic SQL Injection tool called as FatCat , Use of FatCat for testing your web application and exploit your application m…☆18Oct 22, 2015Updated 10 years ago
- POLAR☆74Feb 13, 2019Updated 7 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Simple ways to 0wn simple IOT devices☆65Mar 27, 2015Updated 10 years ago
- Simple apt package cache for use with Docker☆13Oct 19, 2019Updated 6 years ago
- PDML importer for Burp Suite☆28Oct 20, 2020Updated 5 years ago
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- A Docker app to dump RDS databases to disk, using the latest RDS snapshot rather than the live DB instance.☆11Jun 5, 2018Updated 7 years ago
- This project provides a setup using Docker to create a service running Tor and a lighttpd web server. The .onion address remains persiste…☆16Jun 17, 2025Updated 9 months ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago
- ☆13Nov 28, 2015Updated 10 years ago
- Issues to consider when planning a red team exercise.☆15Aug 22, 2017Updated 8 years ago
- psdoom-ng is a First Person Shooter operating system process killer based on psDooM and Chocolate Doom.☆11Jan 21, 2015Updated 11 years ago
- Try harder to bypass that WAF...☆14Jan 4, 2015Updated 11 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Funnel is a lightweight yara-based feed scraper☆38May 22, 2023Updated 2 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- ☆30Jan 30, 2021Updated 5 years ago
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- A collection of steganography tools.☆15Nov 2, 2020Updated 5 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- A compliation of OmniGraffle stencils for mobile UX☆22Dec 13, 2013Updated 12 years ago
- ☆45Apr 22, 2017Updated 8 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A reference implementation for a weave data structure to allow quick reconstruction of old versions of a compressed repository in version…☆17Jan 2, 2016Updated 10 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- A simple tool to manipulate window objects in Windows☆45Dec 22, 2016Updated 9 years ago