chris-anley / cqLinks
CQ, a code security scanner
☆100Updated last year
Alternatives and similar repositories for cq
Users that are interested in cq are comparing it to the libraries listed below
Sorting:
- ☆116Updated 2 years ago
- ☆33Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- A curated list of argument injection vectors☆41Updated 9 months ago
- Manager of third-party sources of Semgrep rules 🗂☆90Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆138Updated this week
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆114Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated 2 weeks ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- Still point in moving world.☆49Updated 3 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- ☆27Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- ☆104Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 9 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- a deterministic finite automata ranker☆71Updated 3 years ago
- ☆87Updated 2 weeks ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- Tools to assess DNS security.☆153Updated last year
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 3 years ago
- Automated vulnerability discovery and annotation☆67Updated last year
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- ☆17Updated 3 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Updated 3 months ago