b0n1t0 / gSASTLinks
gSAST - Grep Static Analysis Security Tool
☆13Updated last year
Alternatives and similar repositories for gSAST
Users that are interested in gSAST are comparing it to the libraries listed below
Sorting:
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- Checks if files is accessible based on the source code.☆16Updated last year
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- ☆58Updated last year
- Find the remote website version based on a git repository☆126Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- ☆58Updated 3 years ago
- Sample Obsidian's vault for web pentesting☆101Updated last year
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆82Updated 3 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆118Updated 2 years ago
- HTTP verb tampering & methods enumeration☆63Updated 4 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Web CTF CheatSheet 🐈☆34Updated 6 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Updated 2 years ago
- ☆67Updated 2 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Updated 2 years ago
- Script for Bug Bounty☆29Updated 4 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- ☆23Updated 4 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- Execute Trickest workflows right from your terminal☆95Updated last month
- Template used for my OSCP exam.☆29Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Updated 11 months ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago