sethlaw / sputr
Security Payload Unit Test Repository (SPUTR)
☆86Updated 2 years ago
Alternatives and similar repositories for sputr:
Users that are interested in sputr are comparing it to the libraries listed below
- ☆25Updated 7 years ago
- A HackerOne API client for Python☆19Updated 7 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 9 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆113Updated 6 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 2 years ago
- Common Findings Database☆100Updated 5 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- Web Application Security☆125Updated 10 months ago
- Code Review Audit Script Scanner☆140Updated last year
- Extract Sense out of Gibberish stuff☆82Updated 7 years ago
- ☆63Updated 2 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆138Updated 4 years ago
- Content for OWASP Summit 2017 site☆128Updated 4 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Updated 8 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- Externalize Java application access to protected resources as log messages.☆41Updated this week
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 8 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆102Updated last year
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago