OWASP / raider
OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions
☆104Updated last year
Alternatives and similar repositories for raider:
Users that are interested in raider are comparing it to the libraries listed below
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- Target practice for ffuf☆61Updated 3 years ago
- Archive of Potential Insider Threats☆143Updated last year
- Intentionaly very vulnerable API with bonus bad coding practices☆41Updated last year
- ☆149Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆123Updated 10 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- HTTP parameter discovery suite.☆61Updated 4 years ago
- ☆77Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆95Updated last month
- Execute Trickest workflows right from your terminal☆87Updated last month
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆193Updated 10 months ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆167Updated 2 weeks ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated 2 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆115Updated 2 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- Monitoring the Cloud Landscape☆78Updated this week
- Workshop given at Hack in Paris 2019☆121Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆119Updated 2 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆132Updated 3 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆181Updated 2 years ago
- NotSoCereal: A Deserialization exploit playground☆51Updated 3 years ago
- Find the remote website version based on a git repository☆126Updated 3 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆127Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- Complex payload encoder☆219Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆132Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆156Updated 3 months ago
- ☆90Updated 3 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆56Updated last year