nccgroup / RFC-Security-Research
Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding Internet RFCs
☆18Updated 4 years ago
Alternatives and similar repositories for RFC-Security-Research:
Users that are interested in RFC-Security-Research are comparing it to the libraries listed below
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆21Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆18Updated 5 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Scan and import relevant requests directly to burp!☆9Updated 5 years ago
- Updated 4 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Easy discovery of assets☆13Updated 2 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago