API testing tool written with Python
☆56Feb 8, 2017Updated 9 years ago
Alternatives and similar repositories for pURL
Users that are interested in pURL are comparing it to the libraries listed below
Sorting:
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- This is the Command & Control component of the PlugBot project☆102Feb 15, 2022Updated 4 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35May 24, 2024Updated last year
- ☆18Sep 22, 2018Updated 7 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- A tool geared towards pentesting APIs using OpenAPI definitions.☆187Oct 27, 2022Updated 3 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- HTTP(S) directory/file brute forcer☆21Feb 22, 2023Updated 3 years ago
- Scripts and tools for AWS Pentest☆53Oct 22, 2020Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Extract relative urls from a heap snapshot☆87May 30, 2021Updated 4 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- Extracts subdomains from a specified domain using https://recon.dev.☆16Sep 12, 2020Updated 5 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- An LDAP based Active Directory user and group enumeration tool☆306Feb 11, 2026Updated 2 weeks ago
- Analysis Suite For EAP Enabled Wireless Networks☆124Feb 4, 2019Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104May 1, 2022Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆96Feb 21, 2020Updated 6 years ago
- ☆16Jan 23, 2026Updated last month
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- ☆11Sep 1, 2022Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆85May 10, 2018Updated 7 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆469Nov 14, 2019Updated 6 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆177Jul 29, 2017Updated 8 years ago
- ☆73Nov 5, 2018Updated 7 years ago