Small tool to log HTTP requests for debugging.
☆16May 9, 2020Updated 5 years ago
Alternatives and similar repositories for request-logger
Users that are interested in request-logger are comparing it to the libraries listed below
Sorting:
- Simple wrapper for meg that sieves through meg's output for you.☆59Oct 25, 2019Updated 6 years ago
- ☆18Apr 26, 2021Updated 4 years ago
- Scripts for Sourcegraph search results. Useful for static analysis <3☆28Jun 30, 2023Updated 2 years ago
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 5 months ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Jan 22, 2022Updated 4 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- ☆38Jun 19, 2021Updated 4 years ago
- ☆36Sep 12, 2020Updated 5 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- List of configuration files from WEB-INF and META-INF for use in Unvalidated Forwards and JSP Include vulnerabilities.☆84Mar 23, 2018Updated 7 years ago
- PostScript examples useful for attacking Ghostscript.☆13Aug 1, 2024Updated last year
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- WS-Security message-level security for SOAP (signing and encryption)☆11Oct 19, 2017Updated 8 years ago
- Party Protocol Contracts for code4rena contest☆13Nov 25, 2023Updated 2 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- ☆10Dec 2, 2023Updated 2 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- NUS Greyhats CTF101 Web Security Lesson Material☆10Aug 22, 2015Updated 10 years ago
- Tools for GitHub issue and milestone consolidation across projects.☆63May 27, 2015Updated 10 years ago
- ☆13Mar 27, 2021Updated 4 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- A set of scripts to help automate the management of Burp Collaborator☆12Sep 5, 2025Updated 5 months ago
- Sample demo for creating an Azure File Share using AKS.☆12Jun 6, 2021Updated 4 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- Test your javascript knowledge☆12Jan 10, 2018Updated 8 years ago
- X Developer Challenge☆11Apr 25, 2024Updated last year
- A repository to hold my AWS Cloud Deployment Kit Demos 🎓☆11Apr 15, 2020Updated 5 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- ☆11Aug 14, 2024Updated last year
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 4 years ago