RUB-NDS / REST-AttackerLinks
REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to provide a framework for REST security research.
☆80Updated 2 years ago
Alternatives and similar repositories for REST-Attacker
Users that are interested in REST-Attacker are comparing it to the libraries listed below
Sorting:
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Updated last week
- Cloud Exploit Framework☆114Updated 3 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated last year
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆118Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆30Updated 2 years ago
- ☆106Updated 2 years ago
- ☆61Updated last week
- First iteration of ML based Feedback WAF☆59Updated last year
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆84Updated 6 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- A "Spring4Shell" vulnerability scanner.☆49Updated 10 months ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- ☆27Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Striping CDN & WAF IPs from a list of IP Addresses☆79Updated 7 months ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Find the remote website version based on a git repository☆126Updated 4 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Red Team tools, infrastructure, and hardware weaponized☆109Updated 2 months ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆63Updated 3 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 8 months ago