google / security-testbeds
☆36Updated last month
Alternatives and similar repositories for security-testbeds:
Users that are interested in security-testbeds are comparing it to the libraries listed below
- Plusfish is a classic web application vulnerability scanner/fuzzer and aimed at security professionals☆28Updated 2 years ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Updated 5 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated 3 weeks ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- A collection of my Semgrep rules☆48Updated last year
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆23Updated 9 months ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year
- ☆23Updated 2 months ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆32Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A fast port scanner written in go with a focus on reliability and simplicity.☆16Updated 5 months ago
- ☆15Updated 3 years ago
- ☆12Updated this week
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Postman Integration is an extension for burp to generate Postman collection fomat json file.☆20Updated 2 years ago
- ☆10Updated 3 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Simple WebSocket fuzzer☆32Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Updated 3 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 5 years ago
- Additional active scan checks for BURP☆26Updated 5 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 6 months ago
- ☆19Updated 2 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- IOCs from Google's Threat Analysis Group (TAG)☆29Updated 3 months ago
- ☆70Updated 3 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago