RUB-NDS / REST-AttackerLinks
REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to provide a framework for REST security research.
☆80Updated 2 years ago
Alternatives and similar repositories for REST-Attacker
Users that are interested in REST-Attacker are comparing it to the libraries listed below
Sorting:
- ☆106Updated 2 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆118Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- ☆60Updated last week
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- First iteration of ML based Feedback WAF☆59Updated last year
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆30Updated 2 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆84Updated 5 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆125Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated 2 weeks ago
- Cloud Exploit Framework☆114Updated 3 years ago
- ☆27Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Updated 3 weeks ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Updated 3 months ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 7 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆28Updated 3 years ago
- Red Team tools, infrastructure, and hardware weaponized☆109Updated last month
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆111Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 9 months ago