morganc3 / KOAuthLinks
OAuth 2.0 Dynamic Security Scanner
☆33Updated 4 years ago
Alternatives and similar repositories for KOAuth
Users that are interested in KOAuth are comparing it to the libraries listed below
Sorting:
- A collection of my Semgrep rules☆50Updated 2 years ago
- An Evil OIDC Server☆54Updated 2 years ago
- ☆79Updated 3 years ago
- ☆36Updated 5 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆46Updated 8 years ago
- ☆29Updated 8 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆36Updated 3 weeks ago
- Burp Extension for AWS Signing☆89Updated 8 months ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- ☆25Updated last month
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 3 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Updated 5 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆81Updated 2 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆33Updated 7 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- ☆21Updated 3 weeks ago
- UUID issues for Burp Suite☆52Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- An android application which exploits sieve through android components.☆45Updated 8 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- ☆90Updated 3 years ago
- A lab to play with authentication and authorisation problems☆97Updated 2 years ago
- Easy to use APK/IPA Mobile App Inspector☆79Updated 3 years ago
- A curated list of argument injection vectors☆41Updated 8 months ago
- A natural evolution of Burp Suite's Repeater tool☆93Updated 2 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago