0xInfection / Awesome-WAF
π₯ Web-application firewalls (WAFs) from security standpoint.
β6,645Updated 6 months ago
Alternatives and similar repositories for Awesome-WAF
Users that are interested in Awesome-WAF are comparing it to the libraries listed below
Sorting:
- A collection of custom security tools for quick needs.β3,203Updated 2 years ago
- A Tool for Domain Flyoversβ5,759Updated 2 years ago
- Awesome XSS stuffβ4,912Updated 6 months ago
- A curated list of amazingly awesome Burp Extensionsβ3,173Updated 3 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies andβ¦β3,787Updated 3 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.β6,132Updated last year
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.β5,649Updated 4 months ago
- HTTP parameter discovery suite.β5,623Updated 2 months ago
- A toolkit for testing, tweaking and cracking JSON Web Tokensβ5,821Updated 2 weeks ago
- "Can I take over XYZ?" β a list of services and how to claim (sub)domains with dangling DNS records.β5,158Updated 3 months ago
- An OOB interaction gathering server and client libraryβ3,751Updated last week
- Git All the Payloads! A collection of web attack payloads.β3,772Updated 2 years ago
- A python script that finds endpoints in JavaScript filesβ3,940Updated last year
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.β8,521Updated last year
- A Workflow Engine for Offensive Securityβ5,589Updated 3 weeks ago
- Web application fuzzerβ6,176Updated 8 months ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug natureβ3,893Updated 9 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.β3,419Updated 2 years ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web applicationβ4,704Updated 4 months ago
- Knock Subdomain Scanβ3,984Updated 5 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.β5,292Updated 6 months ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Toolβ3,932Updated last year
- Automatic SSRF fuzzer and exploitation toolβ3,196Updated 2 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, fβ¦β4,218Updated 7 months ago
- Fast subdomains enumeration tool for penetration testersβ10,338Updated 9 months ago
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ4,044Updated last month
- Collection of the cheat sheets useful for pentestingβ4,026Updated last year
- File upload vulnerability scanner and exploitation tool.β3,201Updated last week
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.β5,482Updated 9 months ago
- Fast passive subdomain enumeration tool.β11,650Updated last week