google / security-testbedsLinks
☆51Updated last week
Alternatives and similar repositories for security-testbeds
Users that are interested in security-testbeds are comparing it to the libraries listed below
Sorting:
- A collection of my Semgrep rules☆51Updated 2 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated 10 months ago
- ☆72Updated 3 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆14Updated 2 years ago
- ☆33Updated 2 years ago
- A curated list of argument injection vectors☆41Updated 8 months ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆24Updated 4 years ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Updated last year
- Argument Injection in Dragonfly Ruby Gem☆16Updated 4 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Manager of third-party sources of Semgrep rules 🗂☆89Updated last year
- An extension to use Semgrep inside Burp Suite.☆89Updated 4 months ago
- ☆169Updated 4 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- ☆16Updated 4 years ago
- ☆116Updated 2 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Updated 3 years ago
- ☆51Updated 5 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 3 years ago
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆62Updated 3 years ago
- ☆56Updated 4 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 7 months ago
- A list of queries and actions that I repeat over and over again☆65Updated 5 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Updated 7 years ago
- Determine whether your compute is truly vulnerable to a specific vulnerability by accounting for all factors which affect *actual* exploi…☆141Updated 2 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- 2022 CTF public release☆23Updated 3 years ago
- ☆60Updated 2 years ago
- ☆25Updated last year