shabarkin / CodeAllTheThingsLinks
A list of threat sinks used in the manual security source code review for application security
☆73Updated 2 years ago
Alternatives and similar repositories for CodeAllTheThings
Users that are interested in CodeAllTheThings are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 3 years ago
- ☆44Updated 4 years ago
- ☆58Updated last year
- Enhanced 403 bypass header☆21Updated 3 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Updated 4 years ago
- XSSearch is a comprehensive reflected XSS tool built on selenium framework in python language. It contains more than 3000 payloads for au…☆59Updated 3 years ago
- Striping CDN & WAF IPs from a list of IP Addresses☆80Updated 7 months ago
- Web cache poisoning vulnerability scanner.☆73Updated 3 years ago
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Updated 2 years ago
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆93Updated 4 years ago
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆80Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- I collected it to help the bug hunter get a reward☆57Updated 3 years ago
- ☆49Updated 5 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆118Updated 2 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Updated 3 years ago
- The scripts I write to help me on my bug bounty hunting☆123Updated 3 years ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆82Updated last year
- Script for Bug Bounty☆29Updated 4 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Updated 4 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- A repository to host the subdomain wordlists from my blog https://medium.com/@nynan/what-i-learnt-from-reading-217-subdomain-takeover-bug…☆40Updated 3 years ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆54Updated 3 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago
- Find related domains of a given domain.☆101Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆75Updated last year