bugcrowd / adamaLinks
Adama - Command and Invoker Pattern For Getting Things Done
☆13Updated last year
Alternatives and similar repositories for adama
Users that are interested in adama are comparing it to the libraries listed below
Sorting:
- Ruby library for interacting with Bugcrowd's VRT☆14Updated 3 weeks ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Updated 8 years ago
- Scans packages in npm and pypi for secrets☆31Updated 5 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- Manage project secrets with Keybase encryption within a team☆27Updated 7 years ago
- A Rails application containing multiple vulnerabilities used for demonstration purposes☆20Updated 10 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- ☆18Updated 5 years ago
- Dynamic DNS Update Bruteforce Tool☆29Updated 8 years ago
- A tool for enumerating expired domains in CNAME records☆59Updated 9 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- Learn the basics of cryptography throughout history.☆19Updated 4 years ago
- Generate a personal Jekyll website using your Bibtex references.☆11Updated 5 years ago
- Simple REST-style web service for the CVE searching☆98Updated 2 years ago
- ❄️ Research project for SubFinder core API V2☆36Updated 6 years ago
- Ruby script for spoofing SMTP emails.☆43Updated 2 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Monitor an ECS Deployment☆16Updated last month
- BurpSuite Extension Ruby Template to speed up building a Burp Extension using Ruby☆30Updated 8 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 12 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Updated 8 years ago
- how-to monitor Docker hosts☆10Updated 8 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- ☆13Updated 8 years ago
- bountytpl – template generator cli. By using a template similar to the ones for Template Generator (https://github.com/fransr/template-ge…☆46Updated 5 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago