arall / vulnerabilitiesLinks
Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
☆29Updated last year
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Security Advisories☆34Updated 3 weeks ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Updated 2 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆114Updated last year
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆59Updated 5 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆117Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- Execute Trickest workflows right from your terminal☆94Updated last week
- ☆73Updated 3 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Updated last week
- Static and dynamic Android application security analysis☆74Updated last year
- Vulnerable demo application for the race condition☆22Updated 4 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- ☆49Updated 5 years ago
- ☆60Updated this week
- ☆95Updated 4 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Updated last month
- Web cache poisoning vulnerability scanner.☆72Updated 3 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆66Updated last year
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆76Updated last year
- Python script implementing the favicon hash trick to find subdomains.☆37Updated 2 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Updated 2 years ago
- Host Header Injection Scanner☆48Updated 5 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆81Updated 2 years ago