ZAP add-on containing the web-backdoors and attack files from FuzzDB
☆20Mar 1, 2026Updated 3 weeks ago
Alternatives and similar repositories for fuzzdb-offensive
Users that are interested in fuzzdb-offensive are comparing it to the libraries listed below
Sorting:
- git for the owasp books project; setting up processes capabilities for publishing OWASP books☆19Aug 17, 2018Updated 7 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- ☆15Aug 25, 2023Updated 2 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- Go con Ejemplos☆17Apr 6, 2021Updated 4 years ago
- A research done by Yaara Shriki and Roman Zaikin on Google maps April Fool Prank.☆15Oct 21, 2019Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆29Jan 22, 2016Updated 10 years ago
- ZAP Website☆20Updated this week
- GNS3 Topology Converter☆12Aug 30, 2016Updated 9 years ago
- Symbolic Constants in Python☆24Sep 3, 2024Updated last year
- eZpublish vulnerability scanner☆10Feb 20, 2020Updated 6 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- ☆16Feb 7, 2019Updated 7 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- ICS busybox based on 1.20 with blkid and ext4 support added☆15May 11, 2012Updated 13 years ago
- ☆13Nov 28, 2019Updated 6 years ago
- Services called by the CCADB Salesforce instance to perform specific tasks☆18Jan 28, 2026Updated last month
- Online test is available 👉☆12Updated this week
- A blazing fast, multi-threaded web shell and admin panel finder written in Python 3. 🚀☆12Jan 1, 2026Updated 2 months ago
- Python library for managing malware feeds and blacklists published online by third parties.☆10Nov 13, 2015Updated 10 years ago
- Collection of gobyes (Go By Examples) repositories to build a golang learning corpus.☆16Apr 20, 2018Updated 7 years ago
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- A mix of ctags and anjuta-tags for the perfect C++ ctags☆19May 11, 2023Updated 2 years ago
- My solution for GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition☆19Jun 10, 2020Updated 5 years ago
- Functions for simulatin quantum computing in GNU Octave and Matlab☆13Feb 22, 2022Updated 4 years ago
- Semzhu-Visor; a small embedded hypervisor on AArch64 on qemu☆10Apr 9, 2019Updated 6 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Enable monitor mode in Termux☆15Jun 18, 2020Updated 5 years ago
- ☆14Jul 18, 2019Updated 6 years ago
- SQL injection via unsanitized QuerySet.order_by() input☆13Jul 10, 2021Updated 4 years ago
- Bash scripts that help you audit the system administration on a Linux server☆11Jun 26, 2017Updated 8 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- Argument Injection in Dragonfly Ruby Gem☆16May 26, 2021Updated 4 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 12 years ago