n0psn0ps / FernbachAPILinks
Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabilities in an API environment.
☆30Updated 3 years ago
Alternatives and similar repositories for FernbachAPI
Users that are interested in FernbachAPI are comparing it to the libraries listed below
Sorting:
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 5 years ago
- It's an watcher for new scopes added to bounty-targets-data and send you alert to Slack.☆59Updated 3 years ago
- ☆48Updated 4 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- a tool that compiles a csv of all h1 program stats☆48Updated 2 years ago
- ☆76Updated 5 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- ☆38Updated 5 years ago
- ☆19Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- ☆23Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- ☆38Updated 4 years ago
- ☆15Updated 4 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆75Updated 5 years ago
- Recon Custom WordList Ganerator☆58Updated 5 years ago
- AWS S3 open bucket poc automated script.☆57Updated 4 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆44Updated 2 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Updated 4 years ago
- ☆49Updated 5 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Updated 4 years ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆54Updated 3 years ago
- My Tools For Bug Bounty☆68Updated last year
- Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations☆58Updated 5 years ago
- ☆95Updated 4 years ago
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Updated 2 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated last year
- Stay within program scope☆37Updated 3 years ago