google / plusfishLinks
Plusfish is a classic web application vulnerability scanner/fuzzer and aimed at security professionals
☆28Updated 3 years ago
Alternatives and similar repositories for plusfish
Users that are interested in plusfish are comparing it to the libraries listed below
Sorting:
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 weeks ago
- ☆51Updated last week
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆96Updated last year
- Static Token And Credential Scanner☆95Updated 2 years ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- OSS-Fuzz vulnerabilities for OSV.☆162Updated this week
- Dependency Combobulator☆93Updated last year
- CveXplore☆42Updated last month
- ☆44Updated 4 years ago
- CVE.ICU code.☆46Updated this week
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆81Updated 2 weeks ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆44Updated last week
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆13Updated 4 years ago
- Pattern recognition for hosts, services, and content☆13Updated 3 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- Embedded AppSec Best Practices☆43Updated last week
- ☆22Updated 8 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- Kenna Security API and Scripting Toolkit☆34Updated last month
- A library to enhance and speed up script/exploit writing for CTF players☆41Updated 5 years ago
- Open source tools, libraries, and datasets related to the runZero product and associated research☆121Updated 2 months ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 6 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 3 months ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- Material from presentations done by GoSecure researchers☆34Updated 2 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- Quality assurance testing for the curl project☆94Updated this week
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Updated 4 years ago