rtfpessoa / yavdbLinks
Yet Another Vulnerability Database
☆16Updated 4 years ago
Alternatives and similar repositories for yavdb
Users that are interested in yavdb are comparing it to the libraries listed below
Sorting:
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Updated 3 years ago
- A visual fuzzer written in NodeJS to find Zalgo characters☆53Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- Python Package for burprestapi☆16Updated 5 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Updated 7 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Updated 6 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- ☆13Updated 3 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Updated 2 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- RFD Checker - security CLI tool to test Reflected File Download issues☆64Updated 6 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Updated 11 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 8 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆15Updated 6 years ago
- ☆38Updated 5 years ago