koenbuyens / Vulnerable-OAuth-2.0-ApplicationsLinks
vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.
☆324Updated last year
Alternatives and similar repositories for Vulnerable-OAuth-2.0-Applications
Users that are interested in Vulnerable-OAuth-2.0-Applications are comparing it to the libraries listed below
Sorting:
- ☆172Updated 4 years ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆301Updated 2 years ago
- Burp Extension for easily creating Wordlists☆214Updated 4 years ago
- GraphQL security workshop labs☆118Updated this week
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆348Updated 4 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆218Updated 5 years ago
- ☆214Updated 4 years ago
- ☆375Updated 4 years ago
- A DNS Bruteforcing Wordlist Generator☆362Updated 2 years ago
- All Things Bug Bounty☆115Updated 3 years ago
- Python library and CLI for the Bug Bounty Recon API☆230Updated 4 years ago
- Unofficial documentation for the great tool Param Miner☆185Updated 3 years ago
- ☆432Updated 4 years ago
- Turbo Intruder Scripts☆228Updated 5 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆270Updated 2 years ago
- Adds a customizable "Send to..."-context-menu to your BurpSuite.☆163Updated 3 years ago
- Bugbounty scope tool☆332Updated 10 months ago
- Repo for all the SKF Docker lab examples☆462Updated last year
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆234Updated 3 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆641Updated 6 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆327Updated 6 months ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆288Updated 2 years ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆250Updated 5 years ago
- ☆371Updated 3 years ago
- Security Testing Scripts for JWT☆326Updated 3 years ago
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆282Updated last year
- ☆130Updated 5 years ago
- A simple web app with a XXE vulnerability.☆229Updated 4 years ago
- xss development frameworks, with the goal of making payload writing easier.☆153Updated last year
- Tool for catching and logging different types of requests.☆220Updated 5 years ago