arthurakay / cyberscavengerhunt
A simple scavenger hunt to learn about pentesting a website or web application.
☆16Updated last week
Alternatives and similar repositories for cyberscavengerhunt
Users that are interested in cyberscavengerhunt are comparing it to the libraries listed below
Sorting:
- This projects provides a logger and a connected harlem shake js.☆19Updated last year
- ☆14Updated 2 years ago
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆26Updated 4 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 3 years ago
- OWASP Foundation Web Respository☆28Updated 8 months ago
- A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC☆32Updated 4 months ago
- Rules for detecting security issues in Angular 1.x☆29Updated 2 years ago
- AWS Security Checks☆39Updated 7 years ago
- Generate a personal Jekyll website using your Bibtex references.☆11Updated 5 years ago
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆56Updated 8 months ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆15Updated 8 years ago
- ☆35Updated 3 years ago
- An ultra-compact intro (or refresher) to Web Application Security.☆31Updated 7 years ago
- A very vulnerable implementation of a GraphQL API.☆59Updated 3 years ago
- TSLint rules for Angular☆18Updated 6 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- ☆35Updated 4 years ago
- Open Security Summit 2019☆26Updated 4 years ago
- ☆20Updated 6 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Updated 2 years ago
- Content for 'Measuring Software Quality using Application Security' book published at LeanPub☆38Updated 8 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- OWASP Foundation Web Repository☆47Updated 4 months ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Updated 9 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated last year
- Threat Modeling Manifesto☆28Updated 10 months ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- Artwork for all official ZAP swag - posters, stickers, t-shirts etc☆14Updated last year
- Scan secrets from Continuous Integration Build Logs☆51Updated 5 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆9Updated 3 years ago