Secful / awesome-api-securityLinks
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the community.
☆35Updated 2 years ago
Alternatives and similar repositories for awesome-api-security
Users that are interested in awesome-api-security are comparing it to the libraries listed below
Sorting:
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆57Updated last month
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆103Updated 4 months ago
- ☆51Updated 2 years ago
- POSIX script for mail security checks of domain names☆75Updated last year
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆164Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Dredging up secrets from the depths of the file system☆127Updated 7 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆124Updated 5 months ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- ☆73Updated 3 months ago
- An Nmap XSL implementation with Bootstrap. Allows Nmap XML port scan results to be converted into beautiful HTML reports.☆73Updated 11 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 2 years ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- Traps web spiders☆75Updated 5 years ago
- Data Driven Threat Hunting on the RaspberryPi☆29Updated 3 years ago
- InsightVM helpful SQL queries☆65Updated 4 months ago
- ☆77Updated 2 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆238Updated last month
- Repository with some necessary information for you to create your PenTest consultancy☆98Updated 5 months ago
- ☆175Updated 2 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆256Updated last year
- ☆30Updated 2 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 3 months ago
- A list of awesome penetration testing tools and resources.☆81Updated last year
- Multithreaded log4j vulnerability scanner using only bash! Tests all JNDI protocols, HTTP GET/POST, and 84 headers.☆27Updated 3 years ago
- ☆60Updated 4 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆246Updated 2 years ago
- Simple js based storefront demo☆19Updated 2 years ago
- Secret Magpie - Secret Detection Tool☆229Updated 11 months ago