OWASP / raider
OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions
☆104Updated last year
Related projects ⓘ
Alternatives and complementary repositories for raider
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- ☆110Updated last year
- Search for vulnerabilities and exposures while filtering based on age, keywords, and other parameters.☆124Updated 2 years ago
- ☆71Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆98Updated 9 months ago
- HTTP parameter discovery suite.☆60Updated 4 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆178Updated 2 years ago
- A GraphQL enumeration and extraction tool☆128Updated last year
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆190Updated 7 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆118Updated 7 months ago
- Docker toolbox for pentest of web based application.☆141Updated this week
- Archive of Potential Insider Threats☆136Updated last year
- ☆146Updated last year
- Target practice for ffuf☆59Updated 3 years ago
- Web Application Security Testing Tools☆234Updated 8 months ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated 9 months ago
- Intentionaly very vulnerable API with bonus bad coding practices☆40Updated 9 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆43Updated this week
- ☆90Updated 2 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆114Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆166Updated 6 months ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- ☆64Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆42Updated last year
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 3 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆155Updated last week
- Prototype pollution scanner using headless chrome☆197Updated 2 years ago
- ☆36Updated last month