Roadmap to becoming a quality assurance engineer in 2021
☆21Sep 19, 2021Updated 4 years ago
Alternatives and similar repositories for qa-roadmap
Users that are interested in qa-roadmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code of smaller projects.☆27Feb 1, 2026Updated last month
- Bring Your Own FIDO2 Extensions!☆16May 13, 2025Updated 10 months ago
- FIDO2 plugin for age(1)☆14Feb 5, 2021Updated 5 years ago
- A PoC for a malicious Confluence plugin.☆16Aug 15, 2024Updated last year
- A fork of Simple Time Tracker with WearOS support. (Now integrated upstream)☆17Mar 7, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆19Sep 18, 2023Updated 2 years ago
- Ricerca che mostra come scrivere regole per SemGrep per cercare SQL Injection nei plugin di Wordpress che usano action AJAX☆19Jul 22, 2023Updated 2 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Oct 4, 2021Updated 4 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 8 months ago
- ☆25Mar 20, 2026Updated last week
- The legendary netstalking NEtwork SCAnner☆29Jul 23, 2020Updated 5 years ago
- [Edgeshark] Virtual communication discovery in container hosts☆34Updated this week
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Jun 1, 2023Updated 2 years ago
- Vulnerable API for research and education☆54Feb 25, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆96Jun 12, 2025Updated 9 months ago
- Reliable and concurrent access to smartwatch's sensors☆35Jan 28, 2026Updated 2 months ago
- A python3 intruder that gave me bounties, easy to use and as fast as fuff☆38Oct 31, 2020Updated 5 years ago
- Autogrep automates Semgrep rule generation and filtering by using LLMs to analyze vulnerability patches, enabling automatic creation of h…☆76Feb 27, 2025Updated last year
- Python API library for DefectDojo☆43Feb 24, 2023Updated 3 years ago
- **A powerful, offline, single-file HTML tool designed for developers and security researchers to inspect and analyze JavaScript Source Ma…☆94Oct 24, 2025Updated 5 months ago
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆61Jan 2, 2026Updated 2 months ago
- SecretBench is a dataset consisting of different secret types collected from public open-source repositories.☆51Jun 13, 2024Updated last year
- Using Chromium-based browsers as a proxy for C2 traffic.☆148Dec 6, 2025Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Age plugin to encrypt files with fido2 tokens using the hmac-secret extension and non-discoverable credentials.☆84Dec 30, 2025Updated 2 months ago
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆79Jan 9, 2023Updated 3 years ago
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆66Jun 22, 2025Updated 9 months ago
- ☆95Sep 18, 2021Updated 4 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆83Dec 22, 2025Updated 3 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆94Nov 13, 2025Updated 4 months ago
- PoC for CVE-2024-48990☆107Nov 20, 2024Updated last year
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆121Updated this week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆242Feb 3, 2026Updated last month
- Code Pulse is a real-time code coverage tool for penetration testing activities☆122Dec 7, 2022Updated 3 years ago
- CycloneDX SBOM Model and Utils for Creating and Validating BOMs☆108Mar 23, 2026Updated last week
- Erebus is a fast tool for parameter-based vulnerability scanning using a Yaml based template engine like nuclei.☆134Jul 11, 2021Updated 4 years ago
- Complications Suite - Wear OS app☆112Nov 29, 2025Updated 4 months ago
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆109Mar 1, 2022Updated 4 years ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆136Jan 13, 2026Updated 2 months ago