rudraimmunefi / source-code-reviewLinks
Blogs, Tools and other available resources for source code review.
☆9Updated 3 years ago
Alternatives and similar repositories for source-code-review
Users that are interested in source-code-review are comparing it to the libraries listed below
Sorting:
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 3 years ago
- ☆44Updated 3 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 4 years ago
- ☆76Updated 4 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆81Updated 2 years ago
- Checks if files is accessible based on the source code.☆16Updated last year
- Security Advisories☆34Updated 2 weeks ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- ☆48Updated 4 years ago
- A collection of BBRF agents that can be deployed to AWS lambda☆23Updated 8 months ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 4 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- ☆28Updated last year
- Information Security Information From Web☆27Updated 10 months ago
- Burp Extension that copies a request and builds a FFUF skeleton☆111Updated last year
- Workshop given at Hack in Paris 2019☆122Updated 2 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- ☆67Updated 2 years ago
- ☆26Updated 2 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 3 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆65Updated 4 years ago
- BurpSuite using the document and some extensions☆69Updated 5 years ago