koenbuyens / Vulnerable-OAuth-2.0-ApplicationsLinks
vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.
☆320Updated last year
Alternatives and similar repositories for Vulnerable-OAuth-2.0-Applications
Users that are interested in Vulnerable-OAuth-2.0-Applications are comparing it to the libraries listed below
Sorting:
- Burp Extension for easily creating Wordlists☆211Updated 3 years ago
- ☆170Updated 4 years ago
- ☆375Updated 4 years ago
- ☆210Updated 4 years ago
- All Things Bug Bounty☆115Updated 3 years ago
- A DNS Bruteforcing Wordlist Generator☆361Updated 2 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆214Updated 4 years ago
- ☆415Updated 4 years ago
- GraphQL security workshop labs☆113Updated last month
- Python library and CLI for the Bug Bounty Recon API☆229Updated 4 years ago
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆338Updated 4 years ago
- Adds a customizable "Send to..."-context-menu to your BurpSuite.☆164Updated 2 years ago
- Unofficial documentation for the great tool Param Miner☆182Updated 3 years ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆294Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆266Updated 2 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆275Updated 2 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆317Updated last month
- ☆127Updated 5 years ago
- Stuff done in preparation for AWAE course and OSWE certification☆152Updated 4 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆630Updated last month
- Repo for all the SKF Docker lab examples☆454Updated last year
- ☆364Updated 3 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆232Updated 3 years ago
- Turbo Intruder Scripts☆225Updated 5 years ago
- ReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on sc…☆323Updated 5 months ago
- Bugbounty scope tool☆330Updated 5 months ago
- PDF slides☆248Updated 4 years ago
- this html file creates a csrf poc form to any http request.☆280Updated 2 years ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆242Updated 5 years ago
- The Serverless Blind XSS App☆341Updated 3 months ago