garethr / zaprLinks
Easy to use command line security scanner
☆58Updated 9 years ago
Alternatives and similar repositories for zapr
Users that are interested in zapr are comparing it to the libraries listed below
Sorting:
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 10 years ago
- Docker repository for OWTF (64-bit Kali)☆33Updated 5 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- ☆75Updated 11 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- ☆12Updated 8 years ago
- A More or less Random Collection of Scripts for security Testing.☆65Updated 3 years ago
- A collection of my quick and dirty scripts for vulnerability POC and detections☆76Updated 2 months ago
- ☆14Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- ☆61Updated 7 years ago
- Automatically scans for malicious proxies.☆32Updated 10 years ago
- ☆29Updated 8 years ago
- Vulnerable Grails application☆43Updated 10 years ago
- Simple (web-) application vulnerability management system☆21Updated 11 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆109Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 6 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Updated 9 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago