shabarkin / CodeAllTheThingsLinks
A list of threat sinks used in the manual security source code review for application security
☆76Updated 2 years ago
Alternatives and similar repositories for CodeAllTheThings
Users that are interested in CodeAllTheThings are comparing it to the libraries listed below
Sorting:
- XSSearch is a comprehensive reflected XSS tool built on selenium framework in python language. It contains more than 3000 payloads for au…☆59Updated 4 years ago
- Web cache poisoning vulnerability scanner.☆72Updated 3 years ago
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Updated 2 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Script for Bug Bounty☆29Updated 4 years ago
- A Go tool that gets the newest PRs from projectdiscovery/nuclei-templates.☆56Updated 2 years ago
- Resolvers updated daily for reconftw☆47Updated 3 years ago
- Enhanced 403 bypass header☆21Updated 3 years ago
- ☆49Updated 5 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Updated 3 years ago
- Striping CDN & WAF IPs from a list of IP Addresses☆81Updated 9 months ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Updated last year
- The scripts I write to help me on my bug bounty hunting☆123Updated 4 years ago
- Security Advisories☆35Updated 3 months ago
- ☆90Updated 4 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆81Updated 2 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆120Updated 2 years ago
- ☆58Updated last year
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆93Updated 4 years ago
- ☆44Updated 4 years ago
- ☆66Updated 3 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆116Updated 2 years ago
- Tool for testing reflections in the HTTP responses☆60Updated 2 years ago
- Wordlist to bruteforce for LFI☆128Updated 6 years ago
- Some contributions in the nuclei-templates repository☆62Updated 3 years ago
- ☆73Updated 4 years ago
- Extract JavaScript files from burp suite project with ease.☆98Updated 3 years ago