shabarkin / CodeAllTheThingsLinks
A list of threat sinks used in the manual security source code review for application security
☆72Updated 2 years ago
Alternatives and similar repositories for CodeAllTheThings
Users that are interested in CodeAllTheThings are comparing it to the libraries listed below
Sorting:
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 3 years ago
- XSSearch is a comprehensive reflected XSS tool built on selenium framework in python language. It contains more than 3000 payloads for au…☆59Updated 3 years ago
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆92Updated 3 years ago
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- ☆57Updated last year
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- 🔭 Collection of regexp pattern for security passive scanning☆114Updated 2 years ago
- BBSSRF - Bug Bounty SSRF is a powerful tool to check SSRF OOB connection☆38Updated 2 years ago
- Web cache poisoning vulnerability scanner.☆71Updated 3 years ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆35Updated 10 months ago
- Automated Web Recon Shell Scripts☆51Updated 3 years ago
- Enhanced 403 bypass header☆21Updated 2 years ago
- HTTP verb tampering & methods enumeration☆59Updated 3 years ago
- Striping CDN & WAF IPs from a list of IP Addresses☆80Updated last month
- Detects request smuggling via HTTP/2 downgrades.☆92Updated 2 years ago
- List all public repositories for (valid) GitHub usernames☆74Updated last year
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆105Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago
- I collected it to help the bug hunter get a reward☆58Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆74Updated last year
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- Extract JavaScript files from burp suite project with ease.☆90Updated 3 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆44Updated last year
- The scripts I write to help me on my bug bounty hunting☆121Updated 3 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 2 months ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆48Updated 2 years ago