RUB-NDS / REST-AttackerLinks
REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to provide a framework for REST security research.
☆80Updated 2 years ago
Alternatives and similar repositories for REST-Attacker
Users that are interested in REST-Attacker are comparing it to the libraries listed below
Sorting:
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- First iteration of ML based Feedback WAF☆59Updated last year
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Red Team tools, infrastructure, and hardware weaponized☆107Updated 3 months ago
- ☆59Updated last week
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Updated last week
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆84Updated 4 months ago
- Fast website scraper and wordlist generator☆80Updated 5 months ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆118Updated 2 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- ☆106Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 8 months ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- ☆27Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated 2 years ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- ☆56Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆68Updated last year
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago