rootxjs / grpc-goatLinks
gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC security.
☆50Updated last month
Alternatives and similar repositories for grpc-goat
Users that are interested in grpc-goat are comparing it to the libraries listed below
Sorting:
- ☆51Updated last month
- ☆190Updated 6 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Updated 6 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆45Updated 4 months ago
- FrogPost: postMessage Security Testing Tool☆97Updated last week
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆86Updated 4 months ago
- A collection of Turbo Intruder scripts.☆66Updated 9 months ago
- Dredging up secrets from the depths of the file system☆130Updated last year
- ☆47Updated 8 months ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆135Updated 3 years ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 3 months ago
- PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in fi…☆181Updated 3 months ago
- ☆28Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆276Updated 2 weeks ago
- Repository with some necessary information for you to create your PenTest consultancy☆100Updated 9 months ago
- ☆38Updated 4 months ago
- ☆54Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆127Updated 3 years ago
- Cloud subdomains identification tool☆61Updated 6 months ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆142Updated 7 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated last month
- A OWASP Based Checklist With 80+ Test Cases☆154Updated 3 years ago
- ☆19Updated last month
- AI for Ethical Hacking - Workshop☆231Updated 3 weeks ago
- This repository contains information on the CVEs I found.☆50Updated last year
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 5 months ago
- Simple web app to track OWASP WSTG security testing progress☆22Updated last month
- Find CVEs associated to Linux and public exploits on github☆119Updated 6 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆130Updated 9 months ago