☆32May 22, 2023Updated 2 years ago
Alternatives and similar repositories for RoboZap
Users that are interested in RoboZap are comparing it to the libraries listed below
Sorting:
- Using censys to find subdomains but without the APIs just scrapping☆16May 13, 2020Updated 5 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Dec 8, 2022Updated 3 years ago
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- This project demonstrates the concept of a quantum database using Cirq. The quantum database stores binary data in quantum qubits, and op…☆16Apr 3, 2025Updated 11 months ago
- Fortify SonarQube Plugin☆22Jan 19, 2021Updated 5 years ago
- Static Program Analysis for Reliable Trusted Apps☆23Nov 29, 2018Updated 7 years ago
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Jun 28, 2019Updated 6 years ago
- Open Security Summit 2019☆26Nov 16, 2020Updated 5 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆28Jun 13, 2017Updated 8 years ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 3 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Nov 2, 2020Updated 5 years ago
- ☆35Mar 8, 2022Updated 3 years ago
- A deliberately insecure Java web application☆44Oct 23, 2025Updated 4 months ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- Veracode security scanning build extension for Visual Studio Team Services☆14Mar 8, 2016Updated 9 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- ☆30Jan 22, 2026Updated last month
- ☆11May 30, 2021Updated 4 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 7 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Zeek script library for getting the effective TLD of a domain.☆13Apr 12, 2024Updated last year
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- ☆10Jan 31, 2021Updated 5 years ago
- ☆34Jan 22, 2026Updated last month
- ☆11Jun 9, 2020Updated 5 years ago
- Marlin Simulator UI☆15Feb 19, 2026Updated last week
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago