PortSwigger / attack-surface-detector
The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
☆14Updated 3 years ago
Alternatives and similar repositories for attack-surface-detector:
Users that are interested in attack-surface-detector are comparing it to the libraries listed below
- Kubernetes Scanner☆40Updated 3 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- ☆28Updated 8 years ago
- ☆25Updated 3 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Docker Version of Aquatone☆13Updated 6 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- A multi-processed, multi-threaded scanner to discover web directories on multiple URLs.☆21Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- another nmap summarising script☆25Updated 4 years ago
- ☆38Updated 4 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 8 months ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- ☆20Updated 5 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆21Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago