snsttr / diwaLinks
A Deliberately Insecure Web Application
☆67Updated 5 years ago
Alternatives and similar repositories for diwa
Users that are interested in diwa are comparing it to the libraries listed below
Sorting:
- IDOR testing tool. Coded during Lunizz live stream.☆31Updated 5 years ago
- ☆12Updated 2 years ago
- This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.☆55Updated last year
- Privilege Escalation MindMap☆15Updated 5 years ago
- ☆10Updated 11 months ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆22Updated 3 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆36Updated last year
- Reports of cyber threat intelligence☆13Updated 2 years ago
- ☆12Updated 2 years ago
- FastVulnVerify is an advanced Python tool developed to quickly identify common vulnerabilities encountered during penetration testing and…☆36Updated 9 months ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated this week
- Sharing our knowledge and resources in the field of cyber security.☆22Updated 2 years ago
- ☆168Updated 4 years ago
- ☆9Updated 3 years ago
- ☆435Updated 4 months ago
- ☆79Updated 3 years ago
- ☆11Updated 3 months ago
- Tips for Penetration Testing☆125Updated last year
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Updated last year
- Custom Black arch based docker container for continuous automated red teaming☆20Updated this week
- Chista | Open Threat Intelligence Framework☆58Updated last year
- Malware Analysis (Zararlı Yazılım Analizi)☆31Updated 5 years ago
- Damn Vulnerable WordPress Site☆52Updated 2 years ago
- ☆47Updated 2 years ago
- stmctf22☆35Updated 2 years ago
- Hands-on projects for beginners to learn and practice Windows forensics and essential cybersecurity skills☆14Updated last year
- ☆43Updated 4 months ago
- ad-exchange powershell scripts☆27Updated 2 months ago
- ☆11Updated 3 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated last month