OAuth 2.0 Dynamic Security Scanner
☆33Feb 27, 2021Updated 5 years ago
Alternatives and similar repositories for KOAuth
Users that are interested in KOAuth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- decrypt TLS traffic of arbitrary go binaries using SSLKEYLOGFILE debugger hook☆16Oct 24, 2021Updated 4 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- This repository is for mobile app penetration testing checklist☆15Dec 7, 2021Updated 4 years ago
- ☆14Nov 3, 2023Updated 2 years ago
- Very Simple Fuzzer☆21Jun 12, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- examples of using radius2 to solve reversing challenges☆36Jan 3, 2025Updated last year
- Send notifications if a new program is published on HackerOne using Pushbullet☆26Mar 12, 2017Updated 9 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Easy to use APK/IPA Mobile App Inspector☆79Jun 30, 2022Updated 3 years ago
- Simple programmatic Windows processes monitor.☆25Mar 8, 2015Updated 11 years ago
- Writeup for HackerOne H1-415 2020 CTF☆32Feb 3, 2020Updated 6 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- ☆148Feb 17, 2022Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Feb 20, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Damn Vulnerable Thick Client App☆155Jul 16, 2020Updated 5 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- onlyfans downloader☆14Jan 11, 2026Updated 4 months ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 9 years ago
- ☆10Apr 1, 2025Updated last year
- ☆12Aug 1, 2022Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆328Mar 27, 2024Updated 2 years ago
- ☆79Nov 7, 2024Updated last year
- SAST + LLM Interprocedural Context Extractor☆195Oct 28, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆125Nov 8, 2023Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- A collection of AWS penetration testing junk☆1,224Aug 30, 2023Updated 2 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- multiple password 'asher using Python’s hashlib☆15Mar 24, 2021Updated 5 years ago
- Those are my challenges for multiple CTF!☆10Mar 17, 2024Updated 2 years ago
- ☆13Nov 21, 2025Updated 6 months ago
- ☆37Jun 7, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆67Aug 6, 2020Updated 5 years ago
- Supporting material for the frida scripting guide☆22Jul 2, 2022Updated 3 years ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆301May 22, 2023Updated 3 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- eLearnSecurity Web application Penetration Tester eXtreme (eWPTXv2)☆27Feb 6, 2024Updated 2 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- The Router Exploitation Framework☆12Nov 10, 2017Updated 8 years ago