☆77Feb 15, 2025Updated last year
Alternatives and similar repositories for pena
Users that are interested in pena are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated last year
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated last year
- Wireless Network Security Analysis Tool☆17Apr 27, 2025Updated last year
- ☆11Aug 25, 2018Updated 7 years ago
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆68May 1, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆20Dec 17, 2025Updated 4 months ago
- CVE-2022-22978 Spring-Security bypass Demo☆16Jun 2, 2022Updated 3 years ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- ad-exchange powershell scripts☆29Sep 23, 2025Updated 7 months ago
- Tehsat Malware Traffic Generator☆19Jul 10, 2021Updated 4 years ago
- Testing POC for use cases☆26Nov 24, 2024Updated last year
- Tool queries the OpenAI API to enhance the description, impact, and recommendation keys of a nuclei template.☆22Apr 1, 2023Updated 3 years ago
- THP Forensic Challenges☆23Jul 28, 2023Updated 2 years ago
- ☆37Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆16Apr 25, 2025Updated last year
- ☆13Mar 23, 2023Updated 3 years ago
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆18May 21, 2024Updated last year
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆40Apr 5, 2024Updated 2 years ago
- public archive for corCTF 2022☆37Aug 16, 2022Updated 3 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆11Aug 4, 2021Updated 4 years ago
- XSS reflector vulnerabilities exploitation extended.☆28Jul 25, 2021Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Packet Analysis on Steroids☆14Oct 20, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Stats about HTTP response security headers usage mentioned by the OSHP.☆16Jan 25, 2026Updated 3 months ago
- This is the Network Flow Generator for ICSSIM☆18Aug 28, 2025Updated 8 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- IaC threat modeler with STRIDE, MITRE ATT&CK, and PASTA frameworks. REST API, GraphQL, and Docker support for Terraform, CloudFormation, …☆57Mar 25, 2026Updated last month
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Burp Suite extension to easily export sub domains☆12Dec 2, 2019Updated 6 years ago
- ☆37Apr 16, 2026Updated 3 weeks ago
- ☆103Aug 31, 2021Updated 4 years ago
- ☆10Dec 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.☆76Updated this week
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆55Nov 20, 2024Updated last year
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- ☆11Jun 30, 2025Updated 10 months ago
- Generate reverse shells in command line with Go !☆21Aug 9, 2020Updated 5 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- OWASP WSTG Türkçe Rehber☆16Apr 9, 2025Updated last year