Analysis of the Enterprise SAST/DAST product landscape
☆38Feb 28, 2024Updated 2 years ago
Alternatives and similar repositories for EnterpriseSASTDASTProductLandscape
Users that are interested in EnterpriseSASTDASTProductLandscape are comparing it to the libraries listed below
Sorting:
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Aug 15, 2024Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆41Nov 23, 2023Updated 2 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated 11 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- CVE-2024-34102: Unauthenticated Magento XXE☆14Jan 12, 2025Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Feb 25, 2026Updated last week
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last week
- XT Toolchain☆18Feb 24, 2026Updated last week
- javascript extension of windbg for hacker.☆18Jun 27, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆65Mar 15, 2024Updated last year
- ☆19May 1, 2025Updated 10 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- ☆18May 18, 2025Updated 9 months ago
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆19Aug 26, 2025Updated 6 months ago
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.☆17Apr 10, 2023Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- ☆17Jul 17, 2024Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Nov 12, 2023Updated 2 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Sherlock Discord bot☆19Aug 19, 2024Updated last year
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- pwk notes and scripts☆14Apr 29, 2015Updated 10 years ago