amolnaik4 / bodhiLinks
Bodhi - Client-side Vulnerability Playground
☆121Updated 4 years ago
Alternatives and similar repositories for bodhi
Users that are interested in bodhi are comparing it to the libraries listed below
Sorting:
- Files for appsecwiki.com☆119Updated 5 years ago
- Damn Vulnerable eXtensive Training Environment☆106Updated 3 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Updated 11 months ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆158Updated last year
- XSS Hunter Burp Plugin☆150Updated 7 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆81Updated 2 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Updated 5 years ago
- Tools to gather subdomains from Bug Bounty programs☆65Updated 7 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- Damn Vulnerable File Upload V 1.1☆101Updated 7 years ago
- Web Application Security☆128Updated last year
- A simple framework for sending test payloads for known web CVEs.☆133Updated 4 years ago
- Actarus is a custom tool for bug bounty☆77Updated 5 years ago
- DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories.☆87Updated 6 years ago
- XSS Payloads☆49Updated 9 years ago
- Burp Suite Extensions☆129Updated 12 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆138Updated 5 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Send notifications if a new program is published on HackerOne using Pushbullet☆26Updated 8 years ago
- Various tools for managing bug bounty recon and exploration.☆48Updated 2 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- Database of websites for penetration testing☆177Updated 5 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 7 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆158Updated 5 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago