OWASP / raider
OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions
☆104Updated last year
Alternatives and similar repositories for raider:
Users that are interested in raider are comparing it to the libraries listed below
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated last year
- Target practice for ffuf☆60Updated 3 years ago
- ☆67Updated 3 years ago
- ☆147Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆123Updated 9 months ago
- A GraphQL enumeration and extraction tool☆129Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆118Updated 2 years ago
- Search for vulnerabilities and exposures while filtering based on age, keywords, and other parameters.☆123Updated 2 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆157Updated 2 months ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆192Updated 9 months ago
- 🔭 Collection of regexp pattern for security passive scanning☆115Updated last year
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆180Updated 2 years ago
- ☆74Updated last year
- HTTP parameter discovery suite.☆61Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated 11 months ago
- Docker toolbox for pentest of web based application.☆144Updated this week
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆126Updated 2 years ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆167Updated 8 months ago
- NotSoCereal: A Deserialization exploit playground☆51Updated 3 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆50Updated 2 years ago
- ☆110Updated last year
- ☆36Updated this week
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆93Updated last week
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆154Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated this week
- Static code analysis tool based on Elasticsearch☆129Updated 3 years ago