☆91Dec 15, 2025Updated 3 months ago
Alternatives and similar repositories for DepFuzzer
Users that are interested in DepFuzzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆38Jan 25, 2026Updated 2 months ago
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆164Jul 2, 2024Updated last year
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆29Oct 13, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆253Mar 30, 2026Updated 2 weeks ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Dec 9, 2024Updated last year
- Dynamically deploy containers for CTF challenges.☆23Nov 29, 2025Updated 4 months ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆354Mar 10, 2026Updated last month
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆25Oct 1, 2023Updated 2 years ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆53Jul 8, 2024Updated last year
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Recon scripts for Red Team and Web blackbox auditing☆25Mar 3, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Black box fuzzer for web applications☆437Jul 20, 2025Updated 8 months ago
- ☆98Jun 22, 2025Updated 9 months ago
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆62Jan 25, 2025Updated last year
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated last month
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated last month
- ☆15Oct 25, 2021Updated 4 years ago
- 🌩Using CodeQL To Conduct JavaScript Security Analysis Against Modern Web Applications☆20Oct 16, 2024Updated last year
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- An Automated Framework for End-to-End Blind XSS Detection and Reporting☆16Jan 23, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Secrets scanner that understands code☆192Nov 2, 2023Updated 2 years ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆138Dec 23, 2025Updated 3 months ago
- 🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️☆229May 22, 2023Updated 2 years ago
- A Burp Suite extension that helps track and manage multiple sessions simultaneously by color-coding HTTP requests based on custom pattern…☆27Nov 21, 2024Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆25Aug 21, 2023Updated 2 years ago
- ☆16Jul 17, 2024Updated last year
- LLM Testing Findings Templates☆74Feb 14, 2024Updated 2 years ago
- ☆17Jan 9, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated 2 months ago
- ☆17May 1, 2025Updated 11 months ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆502Mar 6, 2026Updated last month
- A simple touchID prompt'er for use in shell scripts.☆99Jun 18, 2024Updated last year
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 4 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 4 months ago