gursev / OyedataLinks
Oyedata is a tool to perform OData assessments
☆13Updated 12 years ago
Alternatives and similar repositories for Oyedata
Users that are interested in Oyedata are comparing it to the libraries listed below
Sorting:
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆87Updated 6 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- A Github Repository Created to compliment a BSides Canberra 2018 talk on SharePoint Security.☆48Updated 7 years ago
- DigiNinja's bucket_finder utility☆17Updated 8 years ago
- A list of "secrets" from JWT sample code and readme files.☆56Updated 4 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated 2 weeks ago
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human society☆120Updated 3 years ago
- NessusV2 File Parser☆65Updated 3 years ago
- ☆51Updated 2 years ago
- A framework built on top of Burp's Python Scripter extension.☆89Updated last year
- ☆111Updated 2 years ago
- Damn Vulnerable C# Application (API)☆74Updated last year
- A tool geared towards pentesting APIs using OpenAPI definitions.☆178Updated 2 years ago
- A set of helper scripts, to be used with jlib to help parsing domains.☆28Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- ☆26Updated last year
- ☆9Updated 5 years ago
- Security checks for http headers and cookies☆26Updated 4 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks☆146Updated 4 years ago
- ☆81Updated 3 years ago
- Resolves an IP address to the cloud provider it is hosted on☆96Updated this week
- ☆67Updated 6 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆86Updated 2 years ago
- Command line nmap XML parser☆30Updated last year
- A natural evolution of Burp Suite's Repeater tool☆93Updated last year
- ☆90Updated 3 years ago
- A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.☆98Updated 6 years ago