arall / vulnerabilitiesLinks
Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
☆29Updated last year
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Security Advisories☆34Updated 2 months ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- ngrok Collaborator Link — yet another Burp Collaborator alternative for free with ngrok.☆115Updated last year
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆75Updated last year
- Find CVE PoCs on GitHub☆153Updated last month
- Execute Trickest workflows right from your terminal☆94Updated last month
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆247Updated 3 weeks ago
- 🔭 Collection of regexp pattern for security passive scanning☆115Updated 2 years ago
- ☆72Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆66Updated last year
- Host Header Injection Scanner☆47Updated 4 years ago
- Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities☆39Updated last week
- Collection of ProjectDiscovery wallpapers☆31Updated last year
- ☆95Updated 4 years ago
- Jumpstart multiple WebSocket servers quickly☆32Updated 3 years ago
- Vulnerable NodeJS Web Application☆97Updated last year
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆31Updated 2 years ago
- Monitoring the Cloud Landscape☆87Updated this week
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆25Updated 3 months ago
- ☆157Updated 3 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆58Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Talosplus is a fast and robust template based Intelligent automation framework primarily developed for Bug Bounty Automation☆89Updated 2 years ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- ☆152Updated 2 years ago
- ☆59Updated this week