RUB-NDS / REST-AttackerLinks
REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to provide a framework for REST security research.
☆80Updated 2 years ago
Alternatives and similar repositories for REST-Attacker
Users that are interested in REST-Attacker are comparing it to the libraries listed below
Sorting:
- First iteration of ML based Feedback WAF☆59Updated last year
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆65Updated 9 months ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆116Updated last year
- ☆54Updated last week
- ☆27Updated 2 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆98Updated 2 years ago
- ☆105Updated 2 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated last month
- A python3 script searching for secret on swaggerhub☆65Updated 3 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆99Updated last week
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated last year
- A "Spring4Shell" vulnerability scanner.☆49Updated 5 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆87Updated last year
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆52Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆84Updated last month
- Just another vulnerable web application.☆36Updated 11 months ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆30Updated 2 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- Fast website scraper and wordlist generator☆81Updated 2 months ago