koenbuyens / Vulnerable-OAuth-2.0-Applications
vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.
☆309Updated 10 months ago
Alternatives and similar repositories for Vulnerable-OAuth-2.0-Applications:
Users that are interested in Vulnerable-OAuth-2.0-Applications are comparing it to the libraries listed below
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆265Updated last year
- Burp Extension for easily creating Wordlists☆210Updated 3 years ago
- ☆370Updated 3 years ago
- Python library and CLI for the Bug Bounty Recon API☆223Updated 3 years ago
- ☆358Updated 3 years ago
- All Things Bug Bounty☆113Updated 2 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆209Updated 4 years ago
- Stuff done in preparation for AWAE course and OSWE certification☆151Updated 4 years ago
- Turbo Intruder Scripts☆222Updated 4 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆274Updated last year
- A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificate☆206Updated 7 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆622Updated 3 months ago
- ☆172Updated 3 years ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆286Updated last year
- ☆396Updated 3 years ago
- Unofficial documentation for the great tool Param Miner☆176Updated 2 years ago
- Adds a customizable "Send to..."-context-menu to your BurpSuite.☆152Updated 2 years ago
- A DNS Bruteforcing Wordlist Generator☆352Updated last year
- Continuous monitoring for JavaScript files☆219Updated 5 years ago
- Client Side Prototype Pollution Scanner☆514Updated 2 years ago
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆317Updated 3 months ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆299Updated 2 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆443Updated 4 years ago
- A script that can resolve an input file of domains and scan them with masscan☆157Updated 4 years ago
- ☆124Updated 4 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆234Updated 3 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆304Updated 3 months ago
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆273Updated 7 months ago
- Bugbounty scope tool☆324Updated 2 months ago
- GraphQL security workshop labs☆102Updated 7 months ago