CyberRoute / graphspecterLinks
GraphSpecter is a tool to audit GraphQL API
☆20Updated last month
Alternatives and similar repositories for graphspecter
Users that are interested in graphspecter are comparing it to the libraries listed below
Sorting:
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆45Updated last week
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆75Updated last month
- Burp Suite Extension with MCP Server to enhance manual application security testing☆16Updated this week
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆32Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 8 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 9 months ago
- A tech enumeration toolkit focused on 404 Not found pages.☆25Updated 8 months ago
- Additional active scan checks for BURP☆27Updated 8 months ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 4 months ago
- Looks for parameters in urls☆34Updated 7 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 8 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 10 months ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated last year
- One line command and control backdoors for APIs and web applications.☆50Updated last year
- Fast and lightweight Web Application Firewall Fingerprinting tool☆62Updated 5 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆87Updated last year
- A tool which helps identifying client-side prototype polluting libraries☆39Updated last month
- Exploits Unauth Docker API☆41Updated last month
- SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration☆41Updated last month
- Manage attack surface data on Elasticsearch☆22Updated last year
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆29Updated last year
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated 7 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Dump paths & pages from Next.js Manifest☆14Updated last year
- Abuse trust-boundaries to bypass firewalls and network controls☆160Updated this week
- Hijack a slack bot to phish your way in☆55Updated last month
- Do bulk whois lookups and get alerted on domains of interest.☆36Updated 10 months ago
- FrogPost: postMessage Security Testing Tool☆80Updated 3 weeks ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last year