chrisallenlane / watchtowerLinks
Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is platform- and language-agnostic.
☆111Updated 7 years ago
Alternatives and similar repositories for watchtower
Users that are interested in watchtower are comparing it to the libraries listed below
Sorting:
- ☆63Updated 12 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- ☆27Updated 7 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- ☆44Updated 7 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- Advanced virtual host bruteforcer☆31Updated 9 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- ☆92Updated 6 years ago
- Exploits and research stuffs☆54Updated last year
- Reflective/DOM XSS scanner built on casperJS☆81Updated 10 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- ☆54Updated 8 years ago
- Websocket based egress tester☆20Updated 8 years ago
- General scripts for random stuff☆38Updated 3 years ago
- Security tools to use on assessments.☆39Updated 9 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- Common Findings Database☆100Updated 5 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- ☆198Updated 9 years ago
- Resources for developers and security engineers to learn the ropes of application security☆97Updated 6 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 3 weeks ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Updated 9 years ago