rudraimmunefi / source-code-reviewLinks
Blogs, Tools and other available resources for source code review.
☆10Updated 4 years ago
Alternatives and similar repositories for source-code-review
Users that are interested in source-code-review are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- ☆28Updated last year
- Regex patterns for manual application source code review☆33Updated 4 years ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆28Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- ☆76Updated 4 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- ☆90Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆66Updated last year
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- Find subdomains and takeovers.☆86Updated 2 years ago
- Target practice for ffuf☆69Updated 4 years ago
- A collection of BBRF agents that can be deployed to AWS lambda☆23Updated last year
- Burp Suite Extension to monitor new scope☆17Updated 4 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆59Updated 11 months ago
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- ☆49Updated 5 years ago
- Checks if files is accessible based on the source code.☆16Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- DNS and Target HTTP History Local Storage and Search☆64Updated 4 years ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 3 years ago
- Random Exploits☆50Updated 2 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 7 months ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆81Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆40Updated 2 years ago
- Recon Custom WordList Ganerator☆58Updated 5 years ago