claire-lex / megagrepLinks
Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directly but for places where you could manually find some.
☆15Updated 3 years ago
Alternatives and similar repositories for megagrep
Users that are interested in megagrep are comparing it to the libraries listed below
Sorting:
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Updated 5 years ago
- ☆22Updated 4 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- ☆32Updated last year
- HTTP requests of FrontPage expolit☆26Updated 11 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Workflow for pentesting web applications.☆21Updated 6 years ago
- ☆48Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- ☆90Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- Stay within program scope☆37Updated 3 years ago
- A BurpSuite plugin for BBRF☆25Updated last year
- Enhanced 403 bypass header☆21Updated 3 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- Regex patterns for manual application source code review☆33Updated 4 years ago
- Checks if files is accessible based on the source code.☆16Updated last year
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 5 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35Updated 3 years ago
- ☆21Updated 8 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆66Updated last year
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Updated 3 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Updated 4 years ago
- gSAST - Grep Static Analysis Security Tool☆13Updated last year
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- ☆53Updated 10 months ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 3 years ago