cobalthq / cobalt-product-public-docs
Source for public Cobalt external product documentation
☆14Updated this week
Alternatives and similar repositories for cobalt-product-public-docs:
Users that are interested in cobalt-product-public-docs are comparing it to the libraries listed below
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- Maturity Model Collaborative project☆14Updated 2 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Updated 9 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzing☆22Updated 4 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Updated 10 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- ☆10Updated 6 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 3 years ago
- ☆15Updated 3 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆13Updated last year
- Updated 4 years ago
- Test domain expiration dates.☆12Updated 2 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Web application pentesting recon☆23Updated 4 years ago
- AWS Security Checks☆37Updated 7 years ago