kantega / kwashcLinks
Kantega Web Application Security Hero Challenge
☆19Updated 4 years ago
Alternatives and similar repositories for kwashc
Users that are interested in kwashc are comparing it to the libraries listed below
Sorting:
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- A Security Scanner for Go☆26Updated 6 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 8 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Updated 7 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Updated 6 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Updated 8 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12Updated 3 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Updated 6 years ago
- ☆28Updated 5 years ago
- ☆30Updated 3 years ago
- Custom semgrep rules registry☆14Updated 3 years ago
- Collection of Semgrep rules for security analysis☆11Updated last year
- ☆19Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 7 years ago
- Burp Extension for AWS Signing☆89Updated 10 months ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 8 years ago
- Check for know iframeBuster XSS☆12Updated last year
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 4 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 5 years ago
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆15Updated 4 years ago