claire-lex / megagrepLinks
Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directly but for places where you could manually find some.
☆15Updated 3 years ago
Alternatives and similar repositories for megagrep
Users that are interested in megagrep are comparing it to the libraries listed below
Sorting:
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Updated 5 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- ☆23Updated 4 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Updated last year
- Workflow for pentesting web applications.☆21Updated 6 years ago
- ☆32Updated last year
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- HTTP requests of FrontPage expolit☆26Updated 12 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 3 years ago
- Stay within program scope☆37Updated 3 years ago
- Wordlists for intelligent directory brute-forcing☆32Updated 4 years ago
- A BurpSuite plugin for BBRF☆25Updated last year
- Checks if files is accessible based on the source code.☆16Updated last year
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆57Updated last year
- gSAST - Grep Static Analysis Security Tool☆13Updated last year
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated last year
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 4 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Updated last month
- One liner regex match to search inside JS files, using curl and grep!☆29Updated 4 years ago
- ☆54Updated 11 months ago
- ☆95Updated 4 years ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Updated 4 years ago
- Regex patterns for manual application source code review☆33Updated 5 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago