The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
☆14Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for attack-surface-detector
Users that are interested in attack-surface-detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This mod is used for duplication exploit in Minecraft.☆12Oct 8, 2024Updated last year
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Clickjacking PoC Generator☆35Oct 1, 2020Updated 5 years ago
- CSRF Scanner Extension for Burp Suite Pro☆20Feb 4, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Jul 6, 2020Updated 5 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- Burp Suite extension to passively scan for applications revealing server error messages☆16Aug 15, 2023Updated 2 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 3 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated 3 months ago
- GDB plug-in based on PWNDBG, GEF and PEDA that makes debugging MIPS with GDB suck less☆16Sep 18, 2024Updated last year
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- Simulation of my relay computer using angular☆11Apr 16, 2026Updated 2 weeks ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆29Jan 31, 2025Updated last year
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- S3 Buckets that will let you list all files inside them☆14Apr 26, 2018Updated 8 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated last year
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- An Erlang library wrapping AES-GCM (AEAD) crypto in a Fernet-like interface☆29Jan 22, 2021Updated 5 years ago
- A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are comp…☆18Jul 26, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Documentation and Support for AttackForge ReportGen☆22Jul 26, 2025Updated 9 months ago
- ☆28Apr 18, 2024Updated 2 years ago
- Persistent memory system for agentic AI via MCP - remember, recall, forget with semantic search with knowledge graph☆39Feb 15, 2026Updated 2 months ago
- A curated list of the more mature AI tools for enhancing developer productivity☆34Jan 19, 2026Updated 3 months ago
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- ☆16Jul 30, 2017Updated 8 years ago
- ☆13Jan 15, 2026Updated 3 months ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Mar 23, 2018Updated 8 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆78Mar 23, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- BinCrowd Plugin for IDA Pro☆44Jan 10, 2012Updated 14 years ago
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 6 years ago
- HackBar plugin for Burpsuite☆27Apr 15, 2021Updated 5 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Apr 14, 2026Updated 2 weeks ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆29Mar 3, 2019Updated 7 years ago