cure53 / Contracts
A small collection of potentially useful contract templates
☆382Updated 2 years ago
Alternatives and similar repositories for Contracts:
Users that are interested in Contracts are comparing it to the libraries listed below
- ☆374Updated 3 years ago
- Watch the latest awesome security talks around the globe☆270Updated 2 years ago
- Websec interview questions by tib3rius answered☆306Updated last year
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆289Updated this week
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆214Updated 3 weeks ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆202Updated 2 months ago
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆453Updated 3 weeks ago
- Secrets scanner that understands code☆188Updated last year
- Private key usage verification☆419Updated last month
- ☆294Updated 5 months ago
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆205Updated 2 months ago
- tool for generating wordlists or extending an existing one using mutations.☆382Updated last year
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆403Updated 2 weeks ago
- My cheatsheet notes to pentest AWS infrastructure☆665Updated 2 years ago
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆306Updated 5 months ago
- Identify privilege escalation paths within and across different clouds☆676Updated 2 months ago
- A checklist of practices for organizations dealing with account takeover (ATO)☆264Updated 3 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆280Updated 9 months ago
- materials we hand out☆142Updated 3 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆113Updated last year
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆495Updated last year
- Attack surface detector that identifies endpoints by static analysis☆640Updated this week
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆229Updated last year
- Twitter vulnerable snippets☆962Updated last month
- ☆375Updated last year
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆397Updated 2 years ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆572Updated 2 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆617Updated last year
- Tool for catching and logging different types of requests.☆219Updated 4 years ago
- Unleash the power of cloud☆744Updated 2 months ago