bugcrowd / adamaLinks
Adama - Command and Invoker Pattern For Getting Things Done
☆13Updated 2 years ago
Alternatives and similar repositories for adama
Users that are interested in adama are comparing it to the libraries listed below
Sorting:
- Ruby library for interacting with Bugcrowd's VRT☆14Updated 5 months ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Updated 8 years ago
- A Rails application containing multiple vulnerabilities used for demonstration purposes☆20Updated 10 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with 50+ secur…☆32Updated last week
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Updated 6 years ago
- ☆20Updated 10 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 9 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Updated 2 years ago
- This burpsuite extender provides a solution on testing Enterprise applications that involve security Authorization tokens into every HTTP…☆47Updated 6 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Updated 9 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- A Custom Scanner for Burp☆31Updated 11 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 9 years ago
- Open Source Vulnerability Disclosure Framework. Maintained by Bugcrowd and Cipherlaw. Merged with https://github.com/disclose/dioterms.☆133Updated 4 years ago
- BurpSuite Extension Ruby Template to speed up building a Burp Extension using Ruby☆30Updated 8 years ago
- Probe a web server for common files and endpoints that are useful for gathering information or gaining a foothold.☆23Updated 11 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Updated 10 years ago
- ☆12Updated 8 years ago
- ☆29Updated 9 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Updated 8 years ago
- Enumerate subdomains through Virustotal☆32Updated 6 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20Updated 10 years ago
- OAuth plugin for Burp Suite Extender☆43Updated 7 years ago
- PHP tool to test XSS☆22Updated 6 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 7 years ago
- Alpha version code of Recon UI☆15Updated 7 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 3 years ago