akto-api-security / tests-libraryLinks
Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities
☆38Updated last week
Alternatives and similar repositories for tests-library
Users that are interested in tests-library are comparing it to the libraries listed below
Sorting:
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- Execute Trickest workflows right from your terminal☆93Updated last week
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- 🔭 Collection of regexp pattern for security passive scanning☆115Updated 2 years ago
- Monitoring the Cloud Landscape☆87Updated this week
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆60Updated 2 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- vīlicus is a bug bounty api dashboard☆41Updated 2 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆43Updated last year
- Running nuclei Continuously☆57Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆30Updated 2 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆117Updated 2 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated last year
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆25Updated last year
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆58Updated 10 months ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆75Updated last year
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆53Updated 11 months ago
- Bcheck scripts for Burp☆28Updated last year
- Dependency Confusion Security Testing Tool☆49Updated 3 years ago
- Mapping from bug bounty and vulnerability disclosure programs to respective GitHub organizations☆77Updated this week
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated last year
- Some contributions in the nuclei-templates repository☆58Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated last year
- IIS shortname scanner + bruteforce☆53Updated last year
- A Burp Suite Extension for parsing Project Files from the CLI.☆87Updated 11 months ago
- The commands and scripts I used in the Live Recon Village talks☆38Updated 4 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Updated 3 years ago