hahwul / authz0
🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.
☆399Updated 2 months ago
Alternatives and similar repositories for authz0:
Users that are interested in authz0 are comparing it to the libraries listed below
- Fast and customizable vulnerability scanner For JIRA written in Python☆318Updated 2 weeks ago
- Gotator is a tool to generate DNS wordlists through permutations.☆465Updated 2 years ago
- Discover new target domains using Content Security Policy☆390Updated this week
- Automated learning of regexes for DNS discovery☆362Updated last year
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆500Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆617Updated last year
- Web dashboard for Interactsh client☆198Updated last month
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆852Updated last year
- Vulnerability Scan with Nuclei☆246Updated 2 months ago
- ☆316Updated this week
- Black box fuzzer for web applications☆415Updated 6 months ago
- Http request smuggling vulnerability scanner☆225Updated 2 years ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆436Updated 2 years ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆931Updated 7 months ago
- Golang client for querying SecurityTrails API data☆544Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆300Updated 2 months ago
- Customisable and automated HTTP header injection☆241Updated 6 months ago
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆255Updated 4 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆56Updated 8 months ago
- Useful "Match and Replace" burpsuite rules☆340Updated last year
- Scrape domain names from SSL certificates of arbitrary hosts☆629Updated 9 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆618Updated 2 months ago
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆268Updated last year
- A Security Tool for Enumerating WebSockets☆341Updated 3 years ago
- ☆394Updated 3 years ago
- Smart context-based SSRF vulnerability scanner.☆349Updated 2 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆344Updated last year
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆229Updated 2 years ago
- ☆514Updated last year
- Generate tens of thousands of subdomain combinations in a matter of seconds☆258Updated last year