google / plusfishLinks
Plusfish is a classic web application vulnerability scanner/fuzzer and aimed at security professionals
☆28Updated 3 years ago
Alternatives and similar repositories for plusfish
Users that are interested in plusfish are comparing it to the libraries listed below
Sorting:
- ☆50Updated last week
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Pattern recognition for hosts, services, and content☆13Updated 3 years ago
- Containerized pentesting tools☆45Updated 3 years ago
- OSS-Fuzz vulnerabilities for OSV.☆161Updated last week
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Updated 4 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆42Updated this week
- Embedded AppSec Best Practices☆42Updated 2 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆77Updated last week
- Core A2P2V functionality (command line based)☆68Updated last year
- ☆44Updated 4 years ago
- CveXplore☆43Updated last week
- A library to enhance and speed up script/exploit writing for CTF players☆41Updated 5 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Open source tools, libraries, and datasets related to the runZero product and associated research☆121Updated last month
- Public repository for Red Canary Research☆37Updated 4 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- ☆20Updated 11 years ago
- CVSS (Common Vulnerability Scoring System) Calculator CVSSv3.1☆54Updated 4 years ago
- A community collection of security reviews of open source software components.☆95Updated last year
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆96Updated last year
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆13Updated 4 years ago
- ☆22Updated 8 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Security conferences talks☆25Updated 5 years ago
- Training scenarios for cyber ranges☆12Updated 5 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- Dependency Combobulator☆93Updated last year
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆62Updated 3 months ago