sqreen / SPAuditLinks
☆39Updated 2 years ago
Alternatives and similar repositories for SPAudit
Users that are interested in SPAudit are comparing it to the libraries listed below
Sorting:
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 4 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆78Updated 5 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆66Updated 2 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- Detect exposed API keys on GitHub commits.☆35Updated 3 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 9 years ago
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- An Entropy-Based Link Vulnerability Tool☆60Updated 7 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆142Updated last year
- umbrella config to achieve scanjs-like functionality through eslint☆87Updated 4 years ago
- eslintrc.js config files for running static analysis on JavaScript to identify security issues.☆63Updated 5 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Updated 3 years ago
- vulnerable single sign on☆151Updated last year
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆104Updated 6 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Updated 3 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆116Updated 6 years ago
- ☆35Updated 5 years ago
- A step by step workshop to exploit various vulnerabilities in Node.js and Java applications☆157Updated last year
- OAuth Security Cheatsheet☆41Updated 11 years ago
- Bodhi - Client-side Vulnerability Playground☆123Updated 4 years ago
- Fast browser-based network discovery module☆115Updated 4 years ago
- DEPRECATED - web security checklist for Firefox Services☆78Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 3 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Updated 6 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 5 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago