arall / vulnerabilitiesLinks
Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
☆29Updated last year
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Security Advisories☆34Updated last month
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆116Updated last year
- ☆69Updated 3 years ago
- Find CVE PoCs on GitHub☆148Updated last week
- Execute Trickest workflows right from your terminal☆93Updated 3 weeks ago
- 🔭 Collection of regexp pattern for security passive scanning☆115Updated 2 years ago
- The First Open Source Bug Bounty Platform☆84Updated 2 months ago
- ☆56Updated last week
- The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks☆35Updated last year
- ☆152Updated last year
- List all public repositories for (valid) GitHub usernames☆74Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆200Updated 2 months ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆31Updated 2 years ago
- Vulnerable Code Snippets☆46Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated last year
- Dependency Confusion Security Testing Tool☆48Updated 3 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- A set of open-source community scripts☆63Updated 9 months ago
- DNS resolution tracing tool☆34Updated 4 years ago
- Vulnerable demo application for the race condition☆21Updated 4 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆61Updated 4 years ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆56Updated 2 months ago
- security.txt collection of most popular world-wide domains☆54Updated last year
- A GraphQL enumeration and extraction tool☆132Updated 2 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆116Updated 2 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆60Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆75Updated last year