Tuanp703 / Presentations-and-Papers
Governance, Risk and Compliance (GRC), Information Security, Blockchain Security, Blockchain Forensics
☆8Updated 2 years ago
Alternatives and similar repositories for Presentations-and-Papers:
Users that are interested in Presentations-and-Papers are comparing it to the libraries listed below
- Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development …☆29Updated 2 years ago
- Open Redirect Vulnerability Payload List☆12Updated 4 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Updated 7 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Burp Suite Extensions☆12Updated 3 years ago
- ☆19Updated 2 years ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 3 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Updated last month
- List of bug bounty programs of companies/organisations in Switzerland☆13Updated 3 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆38Updated last year
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 3 years ago
- ☆22Updated 3 years ago
- King of Bug Bounty Tips Simple Tool☆12Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Automate email search in HaveIBeenPwned☆11Updated 3 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆14Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Updated 2 years ago
- It contain google dork to find the wsdl file.☆13Updated 4 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated last year
- Web application pentesting recon☆23Updated 4 years ago
- Vulnerable FastAPI in reference to Opensource Web Application Security Project (OWASP) TOP 10: 2021☆10Updated 3 years ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆18Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 2 years ago
- Sniper. Passive Secrets Hunting.🚬☆12Updated 2 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 3 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago