arall / vulnerabilitiesLinks
Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
☆29Updated last year
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- ☆73Updated 4 years ago
- A list of threat sinks used in the manual security source code review for application security☆76Updated 2 years ago
- Security Advisories☆35Updated 3 months ago
- ☆154Updated 2 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆116Updated 2 years ago
- Execute Trickest workflows right from your terminal☆95Updated 2 months ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆294Updated 5 months ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆82Updated 3 years ago
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆114Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 3 years ago
- Monitoring the Cloud Landscape☆92Updated last week
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆76Updated last week
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆119Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- Vulnerable NodeJS Web Application☆97Updated last year
- The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks☆36Updated last year
- Find CVE PoCs on GitHub☆160Updated 6 months ago
- HTTP parameter discovery suite.☆65Updated 5 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Updated 3 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- security.txt collection of most popular world-wide domains☆55Updated 2 years ago
- Laravel PHP framework black-box vulnerability scanner☆34Updated last year
- NotSoCereal: A Deserialization exploit playground☆54Updated 4 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated 2 years ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Talosplus is a fast and robust template based Intelligent automation framework primarily developed for Bug Bounty Automation☆92Updated 2 years ago
- Vulnerable Code Snippets☆46Updated 2 years ago
- Directory scans☆85Updated last month
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆129Updated 3 years ago