A list of threat sinks used in the manual security source code review for application security
☆76May 9, 2023Updated 2 years ago
Alternatives and similar repositories for CodeAllTheThings
Users that are interested in CodeAllTheThings are comparing it to the libraries listed below
Sorting:
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆15Aug 8, 2022Updated 3 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆18Feb 6, 2023Updated 3 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- Learn what is NoSQL injection and how to find them ?☆10Jul 22, 2021Updated 4 years ago
- gSAST - Grep Static Analysis Security Tool☆13Mar 30, 2024Updated last year
- bug bounty automation☆13Jul 2, 2021Updated 4 years ago
- It's an watcher for new scopes added to bounty-targets-data and send you alert to Slack.☆59Mar 2, 2022Updated 3 years ago
- Hidden parameters discovery suite☆224Nov 14, 2022Updated 3 years ago
- Signatures for jaeles scanner by @j3ssie☆117Apr 20, 2024Updated last year
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Sep 30, 2022Updated 3 years ago
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 4 years ago
- ☆19Oct 4, 2021Updated 4 years ago
- A CLI tool to extract, analyze, and filter JavaScript links from web pages or URLs, with regex matching and structured JSON output.☆19Jan 6, 2025Updated last year
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Sep 16, 2021Updated 4 years ago
- Common Wordlists☆55Aug 26, 2016Updated 9 years ago
- TapJacking Attacks Demo☆20Apr 25, 2021Updated 4 years ago
- ☆17May 20, 2021Updated 4 years ago
- A web security research tool for DOM testing☆24Feb 7, 2026Updated 3 weeks ago
- Easily schedule commands to run multiple times at set intervals (like a cronjob, but with one command)☆84Apr 5, 2021Updated 4 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Burp Scanner extension to fingerprint and actively scan instances of the Adobe Experience Manager CMS. It checks the website for common m…☆75Mar 22, 2024Updated last year
- ☆95Sep 18, 2021Updated 4 years ago
- ☆14Oct 1, 2021Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆22Nov 20, 2021Updated 4 years ago
- Fast Golang Tool To Get Cname For Domains and Subdomain☆16Feb 7, 2025Updated last year
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆56Jan 10, 2022Updated 4 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆106Aug 20, 2024Updated last year
- Client Side Prototype Pollution Scanner☆523Sep 17, 2022Updated 3 years ago
- ☆38Nov 27, 2020Updated 5 years ago
- Modified Nuclei Templates Version to FUZZ Host Header☆52Jan 11, 2022Updated 4 years ago
- ☆145Jul 25, 2022Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago