google / security-testbedsLinks
☆40Updated 3 months ago
Alternatives and similar repositories for security-testbeds
Users that are interested in security-testbeds are comparing it to the libraries listed below
Sorting:
- Proof of Concepts for unsafe deserialization in Ruby☆16Updated 7 months ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆23Updated last month
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆41Updated 5 months ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year
- Argument Injection in Dragonfly Ruby Gem☆16Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆59Updated last month
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 2 months ago
- ☆60Updated 2 years ago
- Plusfish is a classic web application vulnerability scanner/fuzzer and aimed at security professionals☆28Updated 2 years ago
- A curated list of argument injection vectors☆41Updated 4 months ago
- ☆16Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆20Updated 2 years ago
- Manager of third-party sources of Semgrep rules 🗂☆86Updated 10 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- ☆33Updated 2 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 5 years ago
- ☆49Updated this week
- A fast port scanner written in go with a focus on reliability and simplicity.☆16Updated 7 months ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- ☆31Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- multiple password 'asher using Python’s hashlib☆14Updated 4 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆18Updated 7 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆20Updated 4 years ago
- ☆72Updated 3 years ago
- ☆84Updated 11 months ago
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆62Updated 2 years ago
- ☆34Updated 3 years ago