pumasecurity / puma-preyLinks
Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Core web applications that communicate with web services and data layer applications.
☆21Updated 2 weeks ago
Alternatives and similar repositories for puma-prey
Users that are interested in puma-prey are comparing it to the libraries listed below
Sorting:
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- AWS Security Checks☆39Updated 7 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 2 weeks ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- A very vulnerable implementation of a GraphQL API.☆59Updated 3 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆87Updated 6 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- ☆36Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- DefectDojo Documentation☆17Updated 3 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆92Updated last year
- Detect exposed API keys on GitHub commits.☆34Updated 2 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- ☆28Updated 6 years ago
- ☆50Updated 2 years ago
- A Github Repository Created to compliment a BSides Canberra 2018 talk on SharePoint Security.☆48Updated 7 years ago
- Source for public Cobalt external product documentation☆14Updated last week
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 5 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing☆19Updated 3 years ago
- OWASP Foundation Web Respository☆31Updated 2 years ago