pumasecurity / puma-prey
Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Core web applications that communicate with web services and data layer applications.
☆21Updated 9 months ago
Alternatives and similar repositories for puma-prey:
Users that are interested in puma-prey are comparing it to the libraries listed below
- Scripts and tools for AWS Pentest☆51Updated 4 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 5 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- Jekyll Files for cloudsecwiki.com☆51Updated 3 years ago
- AWS Security Checks☆36Updated 7 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- A Github Repository Created to compliment a BSides Canberra 2018 talk on SharePoint Security.☆47Updated 6 years ago
- Detect exposed API keys on GitHub commits.☆34Updated 2 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆88Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆100Updated last year
- Clickjacking PoC Generator☆35Updated 4 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 4 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆82Updated 4 years ago
- A very vulnerable implementation of a GraphQL API.☆59Updated 3 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 4 years ago
- DefectDojo Documentation☆16Updated 3 years ago
- IriusRisk Community☆63Updated last year
- Personal blog about security, exploitation, CTFs, ...☆20Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Manual JavaScript Linting is a Bug☆49Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 4 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- ☆27Updated 5 years ago
- ☆34Updated 4 years ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- ☆50Updated 2 years ago