dolevf / graphw00fLinks
graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint.
☆674Updated 3 months ago
Alternatives and similar repositories for graphw00f
Users that are interested in graphw00f are comparing it to the libraries listed below
Sorting:
- GraphQL threat framework used by security professionals to research security gaps in GraphQL implementations☆322Updated 3 months ago
- Security Auditor Utility for GraphQL APIs☆517Updated 7 months ago
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆395Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆678Updated last year
- CrackQL is a GraphQL password brute-force and fuzzing utility.☆341Updated last year
- Obtain GraphQL API schema even if the introspection is disabled☆1,294Updated last month
- GraphQL automated security testing toolkit☆325Updated last year
- ☆507Updated 3 weeks ago
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆393Updated 2 years ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆696Updated 2 weeks ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆545Updated 6 months ago
- Golang client for querying SecurityTrails API data☆574Updated 2 years ago
- A Security Tool for Enumerating WebSockets☆361Updated 3 years ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,010Updated last month
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆321Updated 2 months ago
- Gotator is a tool to generate DNS wordlists through permutations.☆494Updated 3 years ago
- Small tool to Grab subdomains using Shodan api.☆507Updated last month
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆633Updated 3 months ago
- Discover new target domains using Content Security Policy☆484Updated last week
- ☆498Updated last year
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆75Updated last year
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆389Updated 3 years ago
- A fuzzer for detecting open redirect vulnerabilities☆775Updated last year
- A fast and minimal JS endpoint extractor☆378Updated 10 months ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆452Updated 3 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,233Updated 2 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆961Updated last year
- CT Log Scanner☆397Updated 6 months ago
- Free, libre, effective, and data-driven wordlists for all!☆627Updated 4 years ago
- a javascript change monitoring tool for bugbounties☆663Updated last year