OWASP / raiderLinks
OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions
☆104Updated 2 years ago
Alternatives and similar repositories for raider
Users that are interested in raider are comparing it to the libraries listed below
Sorting:
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆278Updated last month
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- ☆84Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- Find the remote website version based on a git repository☆125Updated 4 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆58Updated last year
- HTTP parameter discovery suite.☆63Updated 5 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆125Updated 3 years ago
- ☆90Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ☆81Updated 3 years ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- Damn Vulnerable WordPress Site☆51Updated 2 years ago
- Archive of Potential Insider Threats☆151Updated 2 years ago
- ☆153Updated 2 years ago
- Target practice for ffuf☆69Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆90Updated 2 years ago
- ☆39Updated this week
- BurpSuite using the document and some extensions☆70Updated 5 years ago
- Execute Trickest workflows right from your terminal☆93Updated this week
- Docker toolbox for pentest of web based application.☆171Updated this week
- Intentionaly very vulnerable API with bonus bad coding practices☆48Updated last year
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- ☆114Updated 2 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆54Updated 3 years ago
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆64Updated 5 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆117Updated 2 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆176Updated last week
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated last week