Python Duo Push API
☆42May 31, 2025Updated 9 months ago
Alternatives and similar repositories for synackDUO
Users that are interested in synackDUO are comparing it to the libraries listed below
Sorting:
- A Python Library designed to facilitate interaction with Synack's undocumented API endpoints☆25Mar 4, 2025Updated last year
- API for Asset Service☆15Aug 15, 2024Updated last year
- A lightweight version of my bug bounty hunting framework designed to be run on Synack's LP+ machines.☆12Jul 11, 2023Updated 2 years ago
- The Web Security Testing Guide is a comprehensive open source guide to testing the security of web applications and web services.☆31Oct 27, 2025Updated 4 months ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 3 months ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- ☆30Jun 30, 2025Updated 8 months ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- Repository for Ludus french templates☆21Updated this week
- ☆60Jul 26, 2024Updated last year
- 🔗 A curated list of awesome Caido related projects☆46Mar 25, 2025Updated 11 months ago
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- ☆15Jul 23, 2024Updated last year
- ☆18Oct 8, 2024Updated last year
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- Automatic SQL injection and database takeover tool☆45Nov 27, 2025Updated 3 months ago
- CVE-2023-6875 PoC☆25Jan 15, 2024Updated 2 years ago
- Laravel PHP framework black-box vulnerability scanner☆37Sep 3, 2024Updated last year
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆56Dec 29, 2023Updated 2 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Jul 17, 2023Updated 2 years ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 10 months ago
- ☆30Oct 20, 2023Updated 2 years ago
- Facebook Write-ups, PoC, and exploitation codes:☆29Jan 20, 2020Updated 6 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 4 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Discord C2 Profile for Mythic☆32Feb 18, 2025Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Oct 16, 2024Updated last year
- 🛠️ Workflows created by the community☆87Dec 8, 2025Updated 2 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148May 23, 2024Updated last year
- Script to test open Akamai ARL vulnerability.☆69Aug 11, 2021Updated 4 years ago
- NOT for educational purposes: An MCP server for professional penetration testers including STDIO/HTTP/SSE support, nmap, go/dirbuster, ni…☆122Feb 19, 2026Updated 2 weeks ago
- Living off the land searches for explorer and sharepoint☆93Dec 7, 2025Updated 2 months ago
- An Ecomm app built on PHP & MySQL☆10Oct 27, 2022Updated 3 years ago
- Detectify Crowdsource Challenge☆72Apr 26, 2022Updated 3 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆81Oct 20, 2023Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165May 6, 2023Updated 2 years ago
- ☆36Dec 13, 2023Updated 2 years ago