My personal collection of resources (mostly tools and training materials) for source code security audits.
☆106Aug 20, 2024Updated last year
Alternatives and similar repositories for security-code-review
Users that are interested in security-code-review are comparing it to the libraries listed below
Sorting:
- ☆196Feb 26, 2023Updated 3 years ago
- A starter secure code review checklist☆184Nov 26, 2018Updated 7 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated last month
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆15Aug 8, 2022Updated 3 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆37Feb 15, 2026Updated last month
- Extract GraphQL operations from javascript☆23Updated this week
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 7 months ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Collection of templates for linux☆10Jun 2, 2024Updated last year
- ☆38Nov 24, 2025Updated 3 months ago
- generates unique subdomain names and runs httpx on them☆18Apr 8, 2024Updated last year
- ☆12Feb 20, 2025Updated last year
- ☆12Jun 5, 2024Updated last year
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- A collection of js analysis tools & scripts.☆19Mar 8, 2026Updated 2 weeks ago
- A list of threat sinks used in the manual security source code review for application security☆76May 9, 2023Updated 2 years ago
- A simple index for HackTheBox machine along with tags☆16Jan 8, 2026Updated 2 months ago
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆10Apr 1, 2024Updated last year
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- Real Cyber Security Interview Questions for Various Job Roles☆60May 21, 2022Updated 3 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Aug 20, 2024Updated last year
- Every GitHub repo mentioning OSCP — hunted, cloned, read by AI, judged by a human. 399 clean repos.☆76Mar 5, 2026Updated 2 weeks ago
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆163Jul 2, 2024Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆102Jan 12, 2025Updated last year
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- Source Code Review resources for Bug Bounty Hunters & Developers. This Repo is updated consistently.☆79Dec 30, 2021Updated 4 years ago
- A BurpSuite extension that allows you to use Chromium with PwnFox☆43Dec 23, 2025Updated 2 months ago
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆170Feb 16, 2022Updated 4 years ago
- ☆50Feb 12, 2024Updated 2 years ago
- OWASP Code Review Guide Web Repository☆148Jun 22, 2022Updated 3 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- This repo contains the code for my secure code review challenges. People used this as the primary resource to pass FAANG AppSec interview…☆332Mar 12, 2026Updated last week
- You can find hardcoded Api-Key,Secret,Token Etc..☆77Sep 3, 2022Updated 3 years ago
- Reports from various areas of information security☆271Apr 13, 2024Updated last year
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- Reconstruct javascript from a sourcemap in bash☆38Nov 23, 2021Updated 4 years ago