API for Asset Service
☆15Aug 15, 2024Updated last year
Alternatives and similar repositories for api
Users that are interested in api are comparing it to the libraries listed below
Sorting:
- Python Duo Push API☆42May 31, 2025Updated 9 months ago
- The Web Security Testing Guide is a comprehensive open source guide to testing the security of web applications and web services.☆31Oct 27, 2025Updated 4 months ago
- Add-ons, projects, active systems, etc. for x/84☆12Dec 12, 2017Updated 8 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 2 months ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- XSSInspector can defeat any WAF in the world with its AI and 96 filter set. This open-source solution simplifies XSS vulnerability identi…☆12Sep 8, 2025Updated 6 months ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆71Feb 8, 2023Updated 3 years ago
- A lightweight version of my bug bounty hunting framework designed to be run on Synack's LP+ machines.☆12Jul 11, 2023Updated 2 years ago
- ☆60Jul 26, 2024Updated last year
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- ☆11Dec 27, 2023Updated 2 years ago
- ☆25Feb 20, 2026Updated 3 weeks ago
- Lightweight, customizable enumeration script to aid in time-saving when participating in hacking labs or OSCP exam.☆31Feb 18, 2026Updated last month
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)☆18Oct 3, 2024Updated last year
- PoC CVE-2020-6308☆36Dec 29, 2020Updated 5 years ago
- ASUS wifi router RCE vulnerability☆19Oct 13, 2025Updated 5 months ago
- Obtain GraphQL API schema despite disabled introspection!☆69Mar 11, 2026Updated last week
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆26Jan 31, 2026Updated last month
- sudo for compiler bug demo☆13Apr 30, 2015Updated 10 years ago
- privilege escalation by piggy-backing user sudo requests☆16Feb 6, 2023Updated 3 years ago
- The command prompt has been disabled by your administrator☆42May 18, 2023Updated 2 years ago
- ☆12Feb 20, 2025Updated last year
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- We present MAPTA, a multi-agent system for autonomous web application security assessment that combines large language model orchestratio…☆98Aug 28, 2025Updated 6 months ago
- buffer overflow exploits for simple c programs (64 bit)☆17Feb 10, 2020Updated 6 years ago
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- PoC of using Directus as ASPM☆12May 31, 2024Updated last year
- A list of checks with tips for analyzing the security of Android applications☆14Nov 19, 2019Updated 6 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- Showcase the books you have read.☆10Oct 2, 2017Updated 8 years ago
- 🌍 My website☆10Nov 23, 2025Updated 3 months ago