Kantega Web Application Security Hero Challenge
☆19Dec 3, 2020Updated 5 years ago
Alternatives and similar repositories for kwashc
Users that are interested in kwashc are comparing it to the libraries listed below
Sorting:
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- ☆14Apr 23, 2019Updated 6 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 9 months ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- ☆21Sep 25, 2018Updated 7 years ago
- CVE database☆21Sep 2, 2020Updated 5 years ago
- Code samples that correctly check the remote server's SSL certificate☆24Feb 22, 2016Updated 10 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Implementation of ECDAA☆23Nov 10, 2017Updated 8 years ago
- UI für verschiedene Reifegrad-Dimensionen☆32Dec 10, 2022Updated 3 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- ☆24Aug 9, 2022Updated 3 years ago
- Equal Experts Secure Delivery Playbook☆26Feb 21, 2023Updated 3 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆67Apr 11, 2023Updated 2 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- ☆57Jun 17, 2020Updated 5 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Nov 19, 2018Updated 7 years ago
- ☆28Aug 6, 2020Updated 5 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 4 months ago
- Automatic R pipeline for FGSEA and classic enrichment (GO, KEGG, Reactome, Hallmark)☆18Oct 30, 2025Updated 4 months ago
- ☆34Aug 13, 2021Updated 4 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- ☆69Jul 18, 2025Updated 7 months ago
- ☆36Apr 29, 2025Updated 10 months ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago
- Kubernetes offensive framework built in eBPF☆39Mar 14, 2023Updated 2 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- Extreme Startup skeleton server implementations in various frameworks and languages.☆64Sep 20, 2018Updated 7 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 2 weeks ago
- Tainted PhantomJS☆52Jul 6, 2015Updated 10 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Easily create authenticated data structures☆43Apr 11, 2023Updated 2 years ago