OAuth 2.0 Dynamic Security Scanner
☆33Feb 27, 2021Updated 5 years ago
Alternatives and similar repositories for KOAuth
Users that are interested in KOAuth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- The nightmare of WAFs & CDNs, Use multi tricks for bypass ratelimit of WAFs & CDNs & Webservers.☆16Apr 18, 2025Updated 11 months ago
- decrypt TLS traffic of arbitrary go binaries using SSLKEYLOGFILE debugger hook☆15Oct 24, 2021Updated 4 years ago
- This repository is for mobile app penetration testing checklist☆14Dec 7, 2021Updated 4 years ago
- yara-python-dex enabled wheels☆11Aug 31, 2025Updated 6 months ago
- API research and learning☆12May 22, 2019Updated 6 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Java Object Deserialization on Android☆86Apr 11, 2019Updated 6 years ago
- This tool is used to generate Offensive Security Exploit Developer (OSED) exam report. This is a modified version of https://github.com/n…☆14Jan 19, 2025Updated last year
- ☆48Dec 28, 2025Updated 2 months ago
- ☆15Nov 3, 2023Updated 2 years ago
- Very Simple Fuzzer☆21Jun 12, 2020Updated 5 years ago
- examples of using radius2 to solve reversing challenges☆36Jan 3, 2025Updated last year
- Send notifications if a new program is published on HackerOne using Pushbullet☆26Mar 12, 2017Updated 9 years ago
- Easy to use APK/IPA Mobile App Inspector☆79Jun 30, 2022Updated 3 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Oct 1, 2024Updated last year
- ☆35Jan 16, 2026Updated 2 months ago
- Writeup for HackerOne H1-415 2020 CTF☆32Feb 3, 2020Updated 6 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- ☆148Feb 17, 2022Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Feb 20, 2020Updated 6 years ago
- Damn Vulnerable Thick Client App☆155Jul 16, 2020Updated 5 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- ☆12Aug 1, 2022Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆328Mar 27, 2024Updated last year
- Lightweight File Integrity Monitoring Tool☆33Apr 20, 2024Updated last year
- Golang Tool to interact with Launchd and other services with XPC☆29May 7, 2020Updated 5 years ago
- SAST + LLM Interprocedural Context Extractor☆191Oct 28, 2025Updated 4 months ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.☆96Dec 8, 2021Updated 4 years ago
- ☆125Nov 8, 2023Updated 2 years ago
- A collection of AWS penetration testing junk☆1,221Aug 30, 2023Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities.☆72Jan 21, 2020Updated 6 years ago