arall / vulnerabilitiesLinks
Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
☆29Updated last year
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Security Advisories☆34Updated 2 weeks ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- ☆59Updated this week
- ☆73Updated 3 years ago
- Execute Trickest workflows right from your terminal☆93Updated 2 months ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆75Updated last year
- An extension to use Semgrep inside Burp Suite.☆89Updated 4 months ago
- ☆90Updated 3 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆252Updated last month
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆115Updated last year
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Updated 2 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆117Updated 2 years ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- ☆49Updated 4 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆66Updated last year
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆56Updated 4 months ago
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆166Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- ☆95Updated 4 years ago
- Host Header Injection Scanner☆47Updated 4 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆59Updated 4 years ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆25Updated 4 months ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- Static and dynamic Android application security analysis☆73Updated last year
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆33Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- Monitoring the Cloud Landscape☆88Updated this week