arall / vulnerabilities
Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
☆28Updated last year
Alternatives and similar repositories for vulnerabilities:
Users that are interested in vulnerabilities are comparing it to the libraries listed below
- Learning source code review, spot vulnerability, find some ways how to fix it.☆26Updated 2 years ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆23Updated 10 months ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Host Header Injection Scanner☆44Updated 4 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 3 years ago
- Security Advisories☆32Updated last year
- Vulnerable Code Snippets☆45Updated last year
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆49Updated 2 years ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated last month
- A python library to automate time-based blind SQL injection☆50Updated 5 years ago
- Dependency Confusion Security Testing Tool☆47Updated 2 years ago
- Pentest stuff☆49Updated last year
- Check if domain has bug bounty program or not☆27Updated last year
- A simple tool which makes creating nuclei templates even easier.☆36Updated 9 months ago
- Vulnerable demo application for the race condition☆20Updated 3 years ago
- ☆48Updated 4 years ago
- A collection of one off hacks and simple scripts☆28Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- ☆52Updated this week
- Android Pentest Setup Environment☆30Updated 2 years ago
- security.txt collection of most popular world-wide domains☆53Updated last year
- Collection of ProjectDiscovery wallpapers☆29Updated last year
- Extract endpoints marked as disallow in robots files to generate wordlists.☆56Updated 3 years ago
- ☆30Updated 11 months ago
- Automated HTTP Request Repeating With Burp Suite☆36Updated last year
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆20Updated 4 years ago
- ☆53Updated 2 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated 2 years ago