imperva / automatic-api-attack-toolLinks
Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an output.
☆486Updated 2 years ago
Alternatives and similar repositories for automatic-api-attack-tool
Users that are interested in automatic-api-attack-tool are comparing it to the libraries listed below
Sorting:
- Repo for all the SKF Docker lab examples☆458Updated last year
- REST/JSON API to the Burp Suite security tool.☆561Updated 3 months ago
- DOM XSS scanner for Single Page Applications☆414Updated last week
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆267Updated 2 years ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆416Updated 4 years ago
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆1,011Updated 4 years ago
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆443Updated last week
- This repository contains all the supplement material for the book "The art of sub-domain enumeration"☆657Updated 6 years ago
- Finds unknown classes of injection vulnerabilities☆703Updated 6 months ago
- API Fuzzer which allows to fuzz request attributes using common pentesting techniques and lists vulnerabilities☆403Updated 8 years ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆397Updated 4 years ago
- Fuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem☆661Updated 4 years ago
- HTTP file upload scanner for Burp Proxy☆415Updated 2 years ago
- Lesser Known Web Attack Lab☆331Updated 5 years ago
- Security Testing Scripts for JWT☆322Updated 3 years ago
- Subdomain Takeover Scanner | Subdomain Takeover Tool | by 0x94☆365Updated 2 years ago
- An automated target reconnaissance pipeline.☆439Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- Wordlists that have been compiled using Commonspeak2. This repo is updated every time new wordlists are generated.☆539Updated 7 years ago
- Second-order subdomain takeover scanner☆406Updated 2 months ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆740Updated 2 years ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆732Updated 6 years ago
- Web App bug hunting☆573Updated 7 months ago
- A simple SSRF-testing sheriff written in Go☆332Updated last year
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆454Updated 5 years ago
- Bugbounty scope tool☆331Updated 7 months ago
- Advanced Burp Suite Logging Extension☆679Updated last year
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆874Updated 7 months ago
- Python tool to find potential Server Side Reqest Forgery (SSRF) vulnerability parameters.☆334Updated 2 months ago
- Default signature for Jaeles Scanner☆324Updated 3 years ago