silentsignal / SemGWT
Semgrep rules to identify GWT attack surface
☆11Updated 2 years ago
Alternatives and similar repositories for SemGWT:
Users that are interested in SemGWT are comparing it to the libraries listed below
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ☆10Updated 6 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆11Updated 9 months ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated this week
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- ☆9Updated 3 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆17Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated last year
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Updated 4 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- pîrebok (from Kurdish "witch") - a guided adversarial fuzzer☆15Updated 2 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- ☆11Updated 2 years ago
- parsers to make life easier☆12Updated 4 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆10Updated last year