arall / vulnerabilitiesLinks
Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
☆29Updated last year
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Vulnerable demo application for the race condition☆21Updated 4 years ago
- Security Advisories☆34Updated last week
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆74Updated last year
- Dependency Confusion Security Testing Tool☆48Updated 2 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- ☆54Updated last week
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated last year
- Laravel PHP framework black-box vulnerability scanner☆23Updated 10 months ago
- ☆26Updated 2 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆99Updated last week
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆116Updated last year
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- A set of open-source community scripts☆62Updated 9 months ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- A GraphQL enumeration and extraction tool☆131Updated 2 years ago
- Execute Trickest workflows right from your terminal☆93Updated this week
- 🔭 Collection of regexp pattern for security passive scanning☆114Updated 2 years ago
- List all public repositories for (valid) GitHub usernames☆74Updated last year
- The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks☆35Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- ☆94Updated 3 years ago
- A crawler that tests HTML forms for reflection☆48Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated last month
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- security.txt collection of most popular world-wide domains☆54Updated last year
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆60Updated 2 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆44Updated last year