arall / vulnerabilitiesLinks
Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
☆29Updated last year
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Security Advisories☆35Updated 2 months ago
- 🔠Collection of regexp pattern for security passive scanning☆115Updated 2 years ago
- ☆73Updated 4 years ago
- A list of threat sinks used in the manual security source code review for application security☆74Updated 2 years ago
- Execute Trickest workflows right from your terminal☆95Updated last month
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆129Updated 3 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆75Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- Talosplus is a fast and robust template based Intelligent automation framework primarily developed for Bug Bounty Automation☆92Updated 2 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆82Updated 3 years ago
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆119Updated 2 years ago
- ☆154Updated 2 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆294Updated 4 months ago
- Monitoring the Cloud Landscape☆91Updated this week
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated 2 years ago
- A set of open-source community scripts☆65Updated last year
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Updated 3 years ago
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆63Updated 4 years ago
- The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks☆36Updated last year
- Build OpenApi specs for your APIs from Burp's traffic using Levo.ai. Also detect the PII in your APIs.☆31Updated 2 months ago
- Directory scans☆84Updated this week
- ☆49Updated 5 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- Host Header Injection Scanner☆49Updated 5 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆173Updated 3 years ago
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆113Updated 2 years ago