OWASP / raiderLinks
OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions
☆103Updated 2 years ago
Alternatives and similar repositories for raider
Users that are interested in raider are comparing it to the libraries listed below
Sorting:
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Updated 3 years ago
- ☆84Updated 2 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆294Updated 4 months ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- ☆90Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Archive of Potential Insider Threats☆153Updated 2 years ago
- Execute Trickest workflows right from your terminal☆95Updated last month
- Damn Vulnerable WordPress Site☆51Updated 2 years ago
- Intentionaly very vulnerable API with bonus bad coding practices☆49Updated last month
- Docker toolbox for pentest of web based application.☆173Updated this week
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- BurpSuite using the document and some extensions☆72Updated 5 years ago
- ☆41Updated last month
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- Target practice for ffuf☆69Updated 4 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Updated last year
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Updated 4 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆154Updated 2 years ago
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆63Updated 5 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Updated last year
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆54Updated 3 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆98Updated 3 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated this week
- ☆73Updated 4 years ago
- ☆25Updated 6 months ago