threatspec / threatspec_example_reportLinks
A full example report
☆11Updated 6 years ago
Alternatives and similar repositories for threatspec_example_report
Users that are interested in threatspec_example_report are comparing it to the libraries listed below
Sorting:
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 8 years ago
- ☆25Updated 4 years ago
- pypykats in your browser☆56Updated 6 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Updated last year
- Unofficial api for cve.mitre.org☆40Updated 4 years ago
- DNS server limitation mapper☆26Updated 7 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Updated 3 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- ☆38Updated 5 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- Radamsa fuzzer extension for Burp Suite☆23Updated 12 years ago
- A framework for automating penetration testing using a plugin based architecture☆41Updated 3 years ago
- Pentest TeamCity using Metasploit☆45Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 4 years ago
- Template repo for Conjur repositories☆17Updated 3 months ago
- Static Token And Credential Scanner☆95Updated 2 years ago
- A tool for auditing medical devices and healthcare infrastructure☆22Updated last month
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- Telco training☆26Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 7 years ago
- Burp Extension for AWS Signing☆90Updated last year
- Zone transfers for rwhois☆20Updated 6 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- A collection of scripts used to interact with the Burp Rest API☆55Updated 6 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago