OWASP / raider
OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions
☆104Updated last year
Alternatives and similar repositories for raider
Users that are interested in raider are comparing it to the libraries listed below
Sorting:
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- ☆80Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- ☆151Updated last year
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆183Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆71Updated last year
- HTTP parameter discovery suite.☆63Updated 4 years ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆169Updated 3 months ago
- A GraphQL enumeration and extraction tool☆131Updated 2 years ago
- Find the remote website version based on a git repository☆126Updated 3 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆158Updated 6 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆122Updated 2 years ago
- Target practice for ffuf☆64Updated 3 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆179Updated last year
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆127Updated 2 years ago
- Intentionaly very vulnerable API with bonus bad coding practices☆45Updated last year
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- xss development frameworks, with the goal of making payload writing easier.☆142Updated 9 months ago
- ☆110Updated last year
- 🔭 Collection of regexp pattern for security passive scanning☆114Updated 2 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆197Updated last year
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆97Updated 2 years ago
- Execute Trickest workflows right from your terminal☆91Updated last week
- ☆68Updated 3 years ago
- GraphQL security testing tool☆122Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- A list of threat sinks used in the manual security source code review for application security☆71Updated 2 years ago