OWASP / raider
OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions
☆104Updated last year
Alternatives and similar repositories for raider:
Users that are interested in raider are comparing it to the libraries listed below
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆194Updated last year
- A GraphQL enumeration and extraction tool☆130Updated 2 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆121Updated 2 years ago
- Execute Trickest workflows right from your terminal☆90Updated last week
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆124Updated 11 months ago
- Target practice for ffuf☆62Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆44Updated last week
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆53Updated last year
- ☆150Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆166Updated last month
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- ☆102Updated 2 years ago
- ☆80Updated 3 years ago
- ☆76Updated last year
- Find the remote website version based on a git repository☆125Updated 3 years ago
- Damn Vulnerable C# Application (API)☆73Updated 8 months ago
- ☆93Updated 2 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆52Updated 3 years ago
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Intentionaly very vulnerable API with bonus bad coding practices☆44Updated last year
- ☆110Updated last year
- Web Application Security Testing Tools☆241Updated last year
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆127Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last year
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Updated 11 months ago
- Prototype pollution scanner using headless chrome☆216Updated 2 years ago
- Damn Vulnerable Cloud Application☆191Updated 6 years ago
- HTTP parameter discovery suite.☆61Updated 4 years ago