☆93Dec 15, 2025Updated 5 months ago
Alternatives and similar repositories for DepFuzzer
Users that are interested in DepFuzzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆41Jan 25, 2026Updated 3 months ago
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆166Jul 2, 2024Updated last year
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆30Oct 13, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆265Mar 30, 2026Updated last month
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆149Dec 9, 2024Updated last year
- Dynamically deploy containers for CTF challenges.☆24Nov 29, 2025Updated 5 months ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆358Apr 21, 2026Updated last month
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆26Oct 1, 2023Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Recon scripts for Red Team and Web blackbox auditing☆25Mar 3, 2026Updated 2 months ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆56Jul 8, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Black box fuzzer for web applications☆439Jul 20, 2025Updated 10 months ago
- ☆99Jun 22, 2025Updated 11 months ago
- Python code to Serialize and Unserialize java binary serialization format.☆28Feb 27, 2026Updated 2 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆63Jan 25, 2025Updated last year
- ☆85Apr 23, 2026Updated last month
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated 2 months ago
- ☆15Oct 25, 2021Updated 4 years ago
- 🌩Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications☆20Oct 16, 2024Updated last year
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆161Mar 31, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- A high-performance C++ framework for emulating executable binaries☆129Nov 23, 2025Updated 6 months ago
- An Automated Framework for End-to-End Blind XSS Detection and Reporting☆16Jan 23, 2026Updated 4 months ago
- Secrets scanner that understands code☆192Nov 2, 2023Updated 2 years ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- 🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️☆228May 22, 2023Updated 3 years ago
- A Burp Suite extension that helps track and manage multiple sessions simultaneously by color-coding HTTP requests based on custom pattern…☆27Nov 21, 2024Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆25Aug 21, 2023Updated 2 years ago
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆142Dec 23, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆16Jul 17, 2024Updated last year
- LLM Testing Findings Templates☆74Feb 14, 2024Updated 2 years ago
- ☆16Jan 9, 2025Updated last year
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated 4 months ago
- ☆17May 1, 2025Updated last year
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆532May 5, 2026Updated 2 weeks ago