koenbuyens / Vulnerable-OAuth-2.0-Applications
vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.
☆311Updated 11 months ago
Alternatives and similar repositories for Vulnerable-OAuth-2.0-Applications:
Users that are interested in Vulnerable-OAuth-2.0-Applications are comparing it to the libraries listed below
- All Things Bug Bounty☆113Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆265Updated 2 years ago
- ☆172Updated 3 years ago
- Burp Extension for easily creating Wordlists☆211Updated 3 years ago
- Stuff done in preparation for AWAE course and OSWE certification☆151Updated 4 years ago
- ☆372Updated 3 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆210Updated 4 years ago
- This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests a…☆330Updated 3 years ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆221Updated 2 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆274Updated last year
- GraphQL security workshop labs☆102Updated 8 months ago
- ☆126Updated 4 years ago
- Unofficial documentation for the great tool Param Miner☆178Updated 2 years ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆236Updated 5 years ago
- A script that can resolve an input file of domains and scan them with masscan☆157Updated 4 years ago
- Some good resources for getting started with application security☆142Updated 3 years ago
- Bucky (An automatic S3 bucket discovery tool)☆194Updated 3 years ago
- Python library and CLI for the Bug Bounty Recon API☆223Updated 3 years ago
- A simple web app with a XXE vulnerability.☆226Updated 3 years ago
- ☆209Updated 3 years ago
- Bug Bounty stuffs, payloads, scripts, profiles, tips and tricks, ...☆146Updated 4 years ago
- Continuous monitoring for JavaScript files☆218Updated 5 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆123Updated 2 years ago
- ☆402Updated 3 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆229Updated 3 years ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆287Updated last year
- Adds a customizable "Send to..."-context-menu to your BurpSuite.☆153Updated 2 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆623Updated 4 months ago
- ☆130Updated 4 years ago
- GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fing…☆205Updated last year