chrisallenlane / drek-signatures
Example signature files for drek.
☆11Updated 7 years ago
Alternatives and similar repositories for drek-signatures:
Users that are interested in drek-signatures are comparing it to the libraries listed below
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆140Updated 8 months ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆82Updated 4 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- ☆90Updated 2 months ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- A More or less Random Collection of Scripts for security Testing.☆65Updated 2 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆138Updated 4 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Updated 7 years ago
- ☆63Updated 12 years ago
- ☆89Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Amazon S3 bucket spelunking!☆86Updated 7 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Docker container for Zachary Rice Gitleaks☆20Updated 5 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 9 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 4 years ago
- ☆55Updated 4 years ago
- ❄️ Research project for SubFinder core API V2☆36Updated 6 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 10 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago