cyprosecurity / API-SecurityEmpireLinks
API Security Project aims to present unique attack & defense methods in API Security field
☆286Updated 3 years ago
Alternatives and similar repositories for API-SecurityEmpire
Users that are interested in API-SecurityEmpire are comparing it to the libraries listed below
Sorting:
- ☆327Updated 2 months ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 3 years ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆336Updated 9 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆267Updated 2 years ago
- Watch the latest awesome security talks around the globe☆278Updated 7 months ago
- Full Nuclei automation script with logic explanation.☆245Updated 3 years ago
- 🚀 Join us for 30days of daily API security tests. #30days30tests We've spent last 120days building amazing API security tests for the c…☆217Updated 2 years ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆428Updated 11 months ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆422Updated 2 weeks ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆274Updated 3 weeks ago
- Awesome information for WebSockets security research☆276Updated 3 years ago
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆120Updated last year
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆431Updated 8 months ago
- Zero-dollar attack surface management tool☆299Updated last year
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆191Updated 10 months ago
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆283Updated 2 years ago
- Smart context-based SSRF vulnerability scanner.☆356Updated 3 years ago
- Damn Vulnerable Cloud Application☆199Updated 7 years ago
- Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to In…☆194Updated 2 years ago
- GraphQL automated security testing toolkit☆325Updated last year
- ☆523Updated 2 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆357Updated 2 years ago
- Web Application Security Testing Tools☆250Updated last year
- Vulnerability Scan with Nuclei☆268Updated last week
- Build your own reconnaissance system with Osmedeus Next Generation☆197Updated last month
- Useful "Match and Replace" burpsuite rules☆349Updated 2 years ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆228Updated 3 years ago
- Generate tens of thousands of subdomain combinations in a matter of seconds☆271Updated 2 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆235Updated 3 years ago
- Prototype pollution scanner using headless chrome☆219Updated 3 years ago