OWASP / raiderLinks
OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions
☆103Updated 2 years ago
Alternatives and similar repositories for raider
Users that are interested in raider are comparing it to the libraries listed below
Sorting:
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆291Updated 3 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- ☆85Updated 2 years ago
- Archive of Potential Insider Threats☆152Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- ☆41Updated last week
- Docker toolbox for pentest of web based application.☆172Updated this week
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Execute Trickest workflows right from your terminal☆94Updated 2 weeks ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated this week
- Tools to assess DNS security.☆153Updated last year
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆125Updated 3 years ago
- BurpSuite using the document and some extensions☆71Updated 5 years ago
- HTTP parameter discovery suite.☆63Updated 5 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆192Updated last year
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆59Updated last year
- Target practice for ffuf☆69Updated 4 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆114Updated 2 years ago
- ☆90Updated 3 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆54Updated 3 years ago
- Intentionaly very vulnerable API with bonus bad coding practices☆48Updated 3 weeks ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆69Updated 6 months ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆98Updated 3 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆157Updated last year
- ☆83Updated 3 years ago
- NotSoCereal: A Deserialization exploit playground☆54Updated 3 years ago