The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
☆14Feb 10, 2022Updated 4 years ago
Alternatives and similar repositories for attack-surface-detector
Users that are interested in attack-surface-detector are comparing it to the libraries listed below
Sorting:
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Jul 6, 2020Updated 5 years ago
- Interrogate your GitHub resources with the help of the world's greatest detectives: Powerpipe + Steampipe + Sherlock.☆41Aug 14, 2025Updated 6 months ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- ☆29Jan 31, 2025Updated last year
- ☆42Nov 13, 2025Updated 3 months ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Mar 23, 2018Updated 7 years ago
- A shell script to do various checks on Go code.☆34Feb 13, 2018Updated 8 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Crossword client for Ubuntu☆10Sep 9, 2018Updated 7 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Feb 10, 2026Updated 2 weeks ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- A wireless infusion pump system workbench for security research☆15Jun 22, 2022Updated 3 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆10Feb 13, 2017Updated 9 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- Visualize an Rdio collection chronologically and listen in-page.☆24May 27, 2022Updated 3 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- ☆12Apr 20, 2025Updated 10 months ago
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 10 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- 🗞 Monitors data sources, alerts you when they change☆13Jul 23, 2021Updated 4 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- Python module to check for system call numbers☆11Sep 18, 2023Updated 2 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago