redpointsec / vtmLinks
Vulnerable Task Manager
☆20Updated last year
Alternatives and similar repositories for vtm
Users that are interested in vtm are comparing it to the libraries listed below
Sorting:
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 5 years ago
- ☆29Updated 9 years ago
- AWS Security Checks☆40Updated 8 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 4 years ago
- ☆90Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 7 years ago
- Material from presentations done by GoSecure researchers☆34Updated 2 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- ☆54Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 3 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- Pythonize Intruder Payload☆13Updated 5 years ago
- ☆14Updated 3 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Updated 2 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- ☆35Updated 5 years ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 4 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Updated 3 years ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Dependency Combobulator☆95Updated 2 years ago
- ☆15Updated 4 years ago
- ☆29Updated 6 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year