koenbuyens / Vulnerable-OAuth-2.0-ApplicationsLinks
vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.
☆316Updated last year
Alternatives and similar repositories for Vulnerable-OAuth-2.0-Applications
Users that are interested in Vulnerable-OAuth-2.0-Applications are comparing it to the libraries listed below
Sorting:
- ☆173Updated 4 years ago
- Burp Extension for easily creating Wordlists☆211Updated 3 years ago
- Python library and CLI for the Bug Bounty Recon API☆225Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆266Updated 2 years ago
- ☆374Updated 3 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆274Updated 2 years ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆290Updated 2 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆210Updated 4 years ago
- A script that can resolve an input file of domains and scan them with masscan☆156Updated 4 years ago
- Unofficial documentation for the great tool Param Miner☆178Updated 2 years ago
- All Things Bug Bounty☆115Updated 3 years ago
- Stuff done in preparation for AWAE course and OSWE certification☆152Updated 4 years ago
- GraphQL security workshop labs☆111Updated last month
- Adds a customizable "Send to..."-context-menu to your BurpSuite.☆155Updated 2 years ago
- ☆250Updated 11 months ago
- Bugbounty scope tool☆330Updated 3 months ago
- A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificate☆209Updated 11 months ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆241Updated 5 years ago
- ☆409Updated 4 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆239Updated 3 years ago
- You can read the writeup on this script here☆193Updated 3 years ago
- Turbo Intruder Scripts☆222Updated 4 years ago
- A DNS Bruteforcing Wordlist Generator☆357Updated 2 years ago
- Secret and/or credential patterns used for gf.☆240Updated 2 years ago
- ☆127Updated 4 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆624Updated 6 months ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆301Updated 2 years ago
- SSRF testing tool☆244Updated 2 years ago
- ☆360Updated 3 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆259Updated 2 years ago