redpointsec / vtmLinks
Vulnerable Task Manager
☆17Updated 6 months ago
Alternatives and similar repositories for vtm
Users that are interested in vtm are comparing it to the libraries listed below
Sorting:
- AWS Security Checks☆39Updated 7 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago
- ☆14Updated 2 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆70Updated 5 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆105Updated 2 years ago
- A collection of response templates for invalid bug bounty reports.☆91Updated 7 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆106Updated 2 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆86Updated 2 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Updated 2 years ago
- Unofficial api for cve.mitre.org☆40Updated 3 years ago
- ☆18Updated 5 years ago
- ☆52Updated 5 months ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆22Updated 3 weeks ago
- An example of a mis-configured Rails application release under MIT license.☆20Updated 2 years ago
- Material from presentations done by GoSecure researchers☆35Updated last year
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.☆110Updated 6 months ago
- Reconnaissance tool for GitLab and GitHub organizations☆50Updated last year
- A lab to play with authentication and authorisation problems☆96Updated 2 years ago
- GraphQL application security testing helper☆20Updated 2 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago