pumasecurity / puma-prey
Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Core web applications that communicate with web services and data layer applications.
☆21Updated 8 months ago
Alternatives and similar repositories for puma-prey:
Users that are interested in puma-prey are comparing it to the libraries listed below
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- AWS Security Checks☆36Updated 7 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 5 years ago
- Scripts and tools for AWS Pentest☆51Updated 4 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- A very vulnerable implementation of a GraphQL API.☆57Updated 3 years ago
- Maturity Model Collaborative project☆14Updated last year
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 3 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- A Github Repository Created to compliment a BSides Canberra 2018 talk on SharePoint Security.☆47Updated 6 years ago
- Burp as a Docker Container☆59Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 2 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆75Updated 2 years ago
- Scripts that we use for pentesting☆42Updated 7 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 4 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- ☆32Updated 4 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆89Updated 10 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆99Updated last year
- Personal blog about security, exploitation, CTFs, ...☆20Updated 5 years ago
- Detect exposed API keys on GitHub commits.☆34Updated 2 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆84Updated last year
- Python Package for burprestapi☆16Updated 5 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆87Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆62Updated last year
- Burp Suite plugin created for using Collaborator tool during manual testing☆19Updated 2 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 4 years ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago