anshumanbh / FASTSAM
Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices
☆18Updated 8 years ago
Alternatives and similar repositories for FASTSAM
Users that are interested in FASTSAM are comparing it to the libraries listed below
Sorting:
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- ☆25Updated 4 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Windows Privesc Check☆20Updated 11 years ago
- BurpSuite extension for Repeater tool that renders responses in a real browser.☆7Updated 11 years ago
- Scans crossdomain.xml policies for expired domain names.☆25Updated 9 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- Automated enumeration☆30Updated 4 years ago