securelayer7 / not-a-vuln-listLinks
Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report
☆13Updated 5 months ago
Alternatives and similar repositories for not-a-vuln-list
Users that are interested in not-a-vuln-list are comparing it to the libraries listed below
Sorting:
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆41Updated this week
- ☆46Updated 4 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 5 months ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆40Updated 3 weeks ago
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆33Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆30Updated 7 months ago
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆37Updated this week
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated last year
- ☆18Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 11 months ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated 2 years ago
- Additional active scan checks for BURP☆27Updated 9 months ago
- ☠️ Code for the Defcon Workshop☆23Updated 11 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- A web security research tool for DOM testing☆21Updated this week
- ☆64Updated 2 months ago
- SSLPinDetect is a tool for analyzing Android APKs to detect SSL pinning implementations by scanning for known patterns in decompiled code…☆25Updated 4 months ago
- ☆12Updated 2 months ago
- A python3 script searching for secret on swaggerhub☆65Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 2 years ago
- ☆43Updated 2 months ago
- Verizon Burp Extensions: AI Suite☆131Updated 2 months ago
- ☆27Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 5 months ago
- ☆15Updated last week
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Updated last year
- Advanced test for proxy & waf☆13Updated 10 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 10 months ago
- Unicode Security Toolkit☆36Updated 9 months ago