Code Pulse is a real-time code coverage tool for penetration testing activities
☆123Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for codepulse
Users that are interested in codepulse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- post-exploitation tools☆15Mar 27, 2018Updated 8 years ago
- A tool for detecting XML External Entity (XXE) vulnerabilities in Java applications☆73Sep 4, 2014Updated 11 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 9 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- WASP Research Arena for Software☆12Jun 10, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 11 years ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 7 years ago
- Research material about software engineering at KTH☆18Mar 27, 2026Updated last month
- Web shells for use in penetration testing☆42Mar 5, 2015Updated 11 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Security tools to use on assessments.☆41May 9, 2016Updated 9 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 10 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Jun 6, 2016Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- Burp Suite AMF Extension☆48Sep 24, 2018Updated 7 years ago
- POLAR☆74Feb 13, 2019Updated 7 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Large-scale Machine Learning using Apache Spark☆15May 6, 2019Updated 7 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 9 years ago
- ☆41May 16, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An intercepting proxy, based on Netty☆19Sep 14, 2017Updated 8 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- A practical tool for bytecode manipulation and creating Managed Code Rootkits (MCRs) in the Java Runtime Environment☆58Jan 19, 2020Updated 6 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆142Mar 7, 2018Updated 8 years ago
- DefCon24☆121Sep 2, 2016Updated 9 years ago
- The Outlook HTML Leak Test Project☆130May 12, 2018Updated 7 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago