pumasecurity / puma-preyLinks
Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Core web applications that communicate with web services and data layer applications.
☆21Updated 2 weeks ago
Alternatives and similar repositories for puma-prey
Users that are interested in puma-prey are comparing it to the libraries listed below
Sorting:
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- AWS Security Checks☆39Updated 7 years ago
- A very vulnerable implementation of a GraphQL API.☆59Updated 3 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- A Burp plugin to export findings to DefectDojo☆30Updated last year
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- A Github Repository Created to compliment a BSides Canberra 2018 talk on SharePoint Security.☆48Updated 7 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 4 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆74Updated 3 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆87Updated 6 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- ☆36Updated 4 years ago
- Desktop variant of OWASP Threat Dragon☆77Updated 3 years ago
- ☆12Updated 7 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last month
- ☆28Updated 6 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Vulnerable Java based Web Application☆31Updated 6 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 6 months ago
- ☆20Updated 6 years ago
- Manual JavaScript Linting is a Bug☆49Updated 4 years ago
- .NET Deserialization Passive Scanner☆45Updated 7 years ago