OWASP / raiderLinks
OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions
☆104Updated 2 years ago
Alternatives and similar repositories for raider
Users that are interested in raider are comparing it to the libraries listed below
Sorting:
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- ☆85Updated 2 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆291Updated 3 months ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- BurpSuite using the document and some extensions☆71Updated 5 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆59Updated last year
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Archive of Potential Insider Threats☆152Updated 2 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆54Updated 3 years ago
- Intentionaly very vulnerable API with bonus bad coding practices☆48Updated 3 weeks ago
- Damn Vulnerable WordPress Site☆51Updated 2 years ago
- ☆83Updated 3 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆125Updated 3 years ago
- Target practice for ffuf☆69Updated 4 years ago
- ☆73Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- Simultaneously search CVEs and exploits across multiple cybersecurity data sources.☆13Updated 3 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆192Updated last year
- ☆90Updated 3 years ago
- ☆114Updated 2 years ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- Execute Trickest workflows right from your terminal☆94Updated 2 weeks ago
- Tools to assess DNS security.☆153Updated last year
- HTTP parameter discovery suite.☆63Updated 5 years ago
- Tarpit - A Web application seeded with vulnerabilities, rootkits, backdoors & data leaks☆81Updated 3 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Docker toolbox for pentest of web based application.☆172Updated this week
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆64Updated 5 years ago