flipkart-incubator / AstraView external linksLinks
Automated Security Testing For REST API's
☆2,637Jun 5, 2024Updated last year
Alternatives and similar repositories for Astra
Users that are interested in Astra are comparing it to the libraries listed below
Sorting:
- Fuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem☆668Feb 25, 2021Updated 4 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,484Oct 12, 2024Updated last year
- Automatic SSRF fuzzer and exploitation tool☆3,485Sep 4, 2025Updated 5 months ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆491May 13, 2023Updated 2 years ago
- A Tool for Domain Flyovers☆5,897May 22, 2022Updated 3 years ago
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,435Jun 11, 2025Updated 8 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,901Sep 27, 2021Updated 4 years ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆2,998Dec 11, 2025Updated 2 months ago
- File upload vulnerability scanner and exploitation tool.☆3,299May 8, 2025Updated 9 months ago
- HTTP parameter discovery suite.☆6,086Feb 20, 2025Updated 11 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,770Apr 26, 2024Updated last year
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,117Apr 21, 2024Updated last year
- ☆2,313Dec 8, 2023Updated 2 years ago
- The Swiss Army knife for automated Web Application Testing☆2,324May 8, 2024Updated last year
- The cheat sheet about Java Deserialization vulnerabilities☆3,167May 26, 2023Updated 2 years ago
- Attack Surface Management Platform☆9,386Jan 12, 2026Updated last month
- A python script that finds endpoints in JavaScript files☆4,280Apr 13, 2024Updated last year
- Most advanced XSS scanner.☆14,735Apr 26, 2025Updated 9 months ago
- Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.o…☆1,926Updated this week
- Open Source Vulnerability Management Platform☆6,255Jan 26, 2026Updated 3 weeks ago
- Web application fuzzer☆6,411Jan 21, 2026Updated 3 weeks ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,357May 1, 2025Updated 9 months ago
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,731Updated this week
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,065Updated this week
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,704Dec 1, 2024Updated last year
- This challenge is Inon Shkedy's 31 days API Security Tips.☆2,231Apr 20, 2022Updated 3 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,502Jan 21, 2020Updated 6 years ago
- A curated list of amazingly awesome Burp Extensions☆3,360Feb 15, 2025Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,440Oct 1, 2025Updated 4 months ago
- This tool can be used to brute discover GET and POST parameters☆1,390Aug 24, 2019Updated 6 years ago
- A Modern Orchestration Engine for Security☆6,096Feb 10, 2026Updated last week
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,283Aug 18, 2025Updated 5 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950May 8, 2019Updated 6 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,638Jan 5, 2026Updated last month
- In-depth attack surface mapping and asset discovery☆14,103Feb 10, 2026Updated last week
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,741Dec 4, 2025Updated 2 months ago
- Notes about attacking Jenkins servers☆2,090Jul 10, 2024Updated last year
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,810Nov 10, 2023Updated 2 years ago