apapedulimu / Learn-Source-Code-ReviewLinks
Learning source code review, spot vulnerability, find some ways how to fix it.
☆30Updated 3 years ago
Alternatives and similar repositories for Learn-Source-Code-Review
Users that are interested in Learn-Source-Code-Review are comparing it to the libraries listed below
Sorting:
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆45Updated 3 years ago
- Tools and Scripts used in CRTP☆12Updated 5 years ago
- Simple website to guess API Key / OAuth Token☆48Updated 3 years ago
- ☆49Updated 5 years ago
- Script for Bug Bounty☆29Updated 4 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Updated last year
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 3 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- Script for Reconnaissance(Bug Bounty)☆18Updated 3 years ago
- ☆19Updated 4 years ago
- ☆20Updated 4 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Updated 3 years ago
- Google maps api key checker for pentesting purpose☆28Updated 3 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 4 years ago
- DNS resolution tracing tool☆36Updated 4 years ago
- Jumpstart multiple WebSocket servers quickly☆32Updated 4 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Updated 5 years ago
- Offsec Pentest and Bug Bounty Notes☆25Updated 5 years ago
- Ffuf output browser☆40Updated 2 years ago
- security.txt collection of most popular world-wide domains☆55Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- ☆23Updated 4 years ago
- The First Open Source Bug Bounty Platform☆96Updated last week
- Simple recon tool automates your recon process☆16Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆76Updated 2 years ago
- Static analysis of wordpress plugins☆61Updated 5 years ago