cneill / appsec-resourcesLinks
Resources for developers and security engineers to learn the ropes of application security
☆97Updated 6 years ago
Alternatives and similar repositories for appsec-resources
Users that are interested in appsec-resources are comparing it to the libraries listed below
Sorting:
- ☆92Updated 6 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆168Updated 2 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 10 years ago
- ☆122Updated 7 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- A repository for large scripts from my book.☆161Updated 3 years ago
- Hodor! Fuzzer..☆129Updated 8 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 6 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆168Updated 9 years ago
- BSidesCBR CTF docker compose files☆67Updated 4 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- ☆44Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- A repository of challenges from various CTF competitions.☆156Updated 11 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆152Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Store Burp data and collaborate via git☆53Updated 5 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- ☆32Updated 9 years ago