apapedulimu / Learn-Source-Code-ReviewLinks
Learning source code review, spot vulnerability, find some ways how to fix it.
☆28Updated 2 years ago
Alternatives and similar repositories for Learn-Source-Code-Review
Users that are interested in Learn-Source-Code-Review are comparing it to the libraries listed below
Sorting:
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆44Updated 2 years ago
- ☆48Updated 4 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- Tools and Scripts used in CRTP☆12Updated 5 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 3 years ago
- ☆19Updated 4 years ago
- ☆20Updated 3 years ago
- Script for Reconnaissance(Bug Bounty)☆18Updated 3 years ago
- Script for Bug Bounty☆29Updated 3 years ago
- Vulnerable NodeJS Web Application☆97Updated 11 months ago
- Simple website to guess API Key / OAuth Token☆48Updated 2 years ago
- Simple command shell collections☆35Updated 4 years ago
- Tool for CVE-2022-1388☆14Updated 3 years ago
- Offsec Pentest and Bug Bounty Notes☆25Updated 5 years ago
- security.txt collection of most popular world-wide domains☆54Updated last year
- Extract endpoints marked as disallow in robots files to generate wordlists.☆57Updated 3 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 4 years ago
- Google maps api key checker for pentesting purpose☆27Updated 2 years ago
- Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once☆50Updated 3 years ago
- Checks if files is accessible based on the source code.☆16Updated last year
- Android Pentest Setup Environment☆30Updated 3 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- Web Application Attack☆14Updated 5 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- DNS resolution tracing tool☆34Updated 4 years ago
- SAP penetration testing Web and network cheatsheet☆16Updated 3 years ago