Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Core web applications that communicate with web services and data layer applications.
☆21Aug 26, 2025Updated 7 months ago
Alternatives and similar repositories for puma-prey
Users that are interested in puma-prey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Aug 30, 2018Updated 7 years ago
- The challenge toolbox is a small component which allows you to create, run and check new challenges locally.☆27Mar 11, 2024Updated 2 years ago
- Provide some tips to handle Injection into application code (OWASP TOP 10 - A1).☆10Nov 11, 2020Updated 5 years ago
- OWASP Benchmark Project Utilities - Provides scorecard generation and crawling tools for Benchmark style test suites.☆20Updated this week
- PyDV: Python Data Visualizer☆15Feb 17, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Puma Scan is a software security Visual Studio extension that provides real time, continuous source code analysis as development teams wr…☆448Oct 28, 2022Updated 3 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆14Mar 4, 2017Updated 9 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Jan 29, 2019Updated 7 years ago
- Mirror for exploit-exercises.com☆13Jan 3, 2019Updated 7 years ago
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated last month
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- Foundations of Computer Science notebooks☆17Oct 13, 2025Updated 5 months ago
- DefectDojo Documentation☆17Oct 10, 2021Updated 4 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆16Mar 7, 2026Updated 3 weeks ago
- easy to use SharedPreference. You can read/write your object to SharedPreference easily☆12Oct 10, 2017Updated 8 years ago
- Repo to hold mapping of user-security-stories☆120Nov 28, 2018Updated 7 years ago
- Administration application for the DreamFactory Platform☆13Apr 2, 2024Updated last year
- Scan directories, exports, and backups for sensitive data (like PII and API keys) with Nightfall's data loss prevention (DLP) APIs. Disco…☆11Mar 17, 2022Updated 4 years ago
- A CLI project wrapping application security testing (AST) APIs☆59Mar 20, 2026Updated last week
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- verinice.veo is a cloud-native application for managing information security and data protection☆22Mar 17, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Feb 3, 2023Updated 3 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- Cumulus. Threat modeling the Clouds.☆28Oct 27, 2025Updated 5 months ago
- ☆10Aug 28, 2020Updated 5 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- ☆125Nov 8, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Security Payload Unit Test Repository (SPUTR)☆87Feb 18, 2026Updated last month
- A client for Hashicorp Vault written in TypeScript☆14Nov 20, 2023Updated 2 years ago
- ☆11Apr 18, 2018Updated 7 years ago
- Security conferences talks☆25Jul 10, 2020Updated 5 years ago
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 4 years ago
- Wireshark regression tests☆11Jan 21, 2021Updated 5 years ago
- Generic ASM Vulnerability Schema XSLT☆12May 30, 2018Updated 7 years ago