kantega / kwashcLinks
Kantega Web Application Security Hero Challenge
☆19Updated 4 years ago
Alternatives and similar repositories for kwashc
Users that are interested in kwashc are comparing it to the libraries listed below
Sorting:
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Updated 7 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- ☆18Updated 8 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Updated 8 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- ☆30Updated 3 years ago
- Collection of Semgrep rules for security analysis☆11Updated last year
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 8 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Updated 6 years ago
- All the content from my Troopers 19 talk☆12Updated 6 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Proof-of-Concept scripts for various issues.☆14Updated 8 years ago
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆15Updated 4 years ago
- ☆25Updated last month
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12Updated 3 years ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆38Updated last month
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- A Security Scanner for Go☆26Updated 6 years ago
- ☆19Updated 8 years ago
- Check for know iframeBuster XSS☆12Updated last year
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Updated 4 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 7 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago