harekrishnarai / Damn-vulnerable-sca
Damn Vulnerable SCA Application
☆30Updated 2 months ago
Alternatives and similar repositories for Damn-vulnerable-sca:
Users that are interested in Damn-vulnerable-sca are comparing it to the libraries listed below
- OWASP ASVS Security Evaluation Templates with Nuclei☆28Updated this week
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated 2 weeks ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆113Updated 2 months ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆31Updated last year
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆25Updated 2 years ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆17Updated 6 months ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆24Updated last year
- Additional active scan checks for BURP☆26Updated 4 months ago
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆23Updated last year
- My talks...☆23Updated this week
- HTTP redirection service designed to help bypass SSRF filters. Integrated with Burp Suite.☆14Updated 7 months ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆56Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆58Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆27Updated 2 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆25Updated 4 months ago
- A Burp extension to help pentesters copy requests / responses for reports.☆38Updated last month
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆76Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 5 months ago
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆62Updated 2 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆30Updated last month
- Security Advisories☆32Updated last year
- Build OpenApi specs for your APIs from Burp's traffic using Levo.ai. Also detect the PII in your APIs.☆27Updated 6 months ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆49Updated last month
- Tool to spray AWS Console IAM Logins☆27Updated 2 years ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆63Updated 10 months ago
- ☆52Updated this week
- ☆73Updated 7 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆85Updated last year