rtfpessoa / yavdbLinks
Yet Another Vulnerability Database
☆16Updated 4 years ago
Alternatives and similar repositories for yavdb
Users that are interested in yavdb are comparing it to the libraries listed below
Sorting:
- A regular expression fuzzer.☆45Updated 7 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Updated 3 years ago
- All related files and slides for past talks☆44Updated last month
- A visual fuzzer written in NodeJS to find Zalgo characters☆53Updated 7 years ago
- Python Package for burprestapi☆17Updated 6 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Updated 9 years ago
- RFD Checker - security CLI tool to test Reflected File Download issues☆64Updated 6 years ago
- SSRF Protection Library for PHP - http://safecurl.fin1te.net☆73Updated 2 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Crawlium: A crawling platform based on Chrome (Chromium) browser to get a deeper look into the ecosystem of content inclusion on the Web.☆53Updated 2 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆60Updated last month
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 8 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 3 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Updated 7 years ago
- DNS server limitation mapper☆26Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Updated last year
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A script that inspects multi-byte character sets looking for characters with specific user-defined properties☆27Updated 9 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Updated 5 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Updated 11 years ago