snsttr / diwa
A Deliberately Insecure Web Application
☆67Updated 5 years ago
Alternatives and similar repositories for diwa:
Users that are interested in diwa are comparing it to the libraries listed below
- This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.☆55Updated last year
- IDOR testing tool. Coded during Lunizz live stream.☆31Updated 4 years ago
- ☆12Updated 2 years ago
- FastVulnVerify is an advanced Python tool developed to quickly identify common vulnerabilities encountered during penetration testing and…☆34Updated 7 months ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆115Updated 3 years ago
- Tips for Penetration Testing☆113Updated last year
- Sharing our knowledge and resources in the field of cyber security.☆22Updated 2 years ago
- ☆10Updated 9 months ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆35Updated 11 months ago
- Cloudflare Bypass Script☆22Updated 5 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆22Updated 2 years ago
- Reports of cyber threat intelligence☆13Updated 2 years ago
- ☆80Updated 2 years ago
- stmctf22☆35Updated 2 years ago
- Privilege Escalation MindMap☆15Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 6 years ago
- Custom Black arch based docker container for continuous automated red teaming☆19Updated last month
- ☆168Updated 4 years ago
- ☆76Updated 6 years ago
- ☆44Updated 9 years ago
- ☆426Updated 2 months ago
- Chista | Open Threat Intelligence Framework☆58Updated 11 months ago
- Malware Analysis (Zararlı Yazılım Analizi)☆31Updated 5 years ago
- ☆11Updated 3 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆12Updated 7 months ago
- OWASP based Web Application Security Testing Checklist☆71Updated 9 months ago
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆22Updated 4 years ago
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Updated 10 months ago
- Komsu, from a given list of URLs, generates and visualizes trees. It's aim is to fasten the analysis process.☆9Updated 4 months ago
- ☆137Updated 3 years ago