intruder-io / autoswaggerLinks
Autoswagger by Intruder - detect API auth weaknesses
☆1,202Updated 2 weeks ago
Alternatives and similar repositories for autoswagger
Users that are interested in autoswagger are comparing it to the libraries listed below
Sorting:
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆768Updated last week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆403Updated this week
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆256Updated 3 weeks ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆434Updated last week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,238Updated last year
- secator - the pentester's swiss knife☆1,133Updated last week
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆988Updated 5 months ago
- Bitor Scanning Software☆403Updated 3 weeks ago
- Header Exploitation HTTP☆631Updated last month
- Ollama Automated Security Intelligence Scanner☆195Updated this week
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,712Updated 2 months ago
- Pen Test Report Generation and Assessment Collaboration☆554Updated this week
- The OWASP OFFAT tool autonomously assesses your API for prevalent vulnerabilities, though full compatibility with OAS v3 is pending. The …☆642Updated last month
- A fast WordPress plugin enumeration tool☆662Updated last week
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆267Updated 2 months ago
- The Internets #1 Subdomain Takeover Tool☆266Updated 2 months ago
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆809Updated 4 months ago
- Nmap Dashboard Mini Project☆613Updated last year
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆691Updated last month
- A curated list of tools officially presented at Black Hat events☆649Updated last month
- The useful exploit finder☆813Updated last year
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆376Updated 8 months ago
- ☆566Updated 2 months ago
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆785Updated last month
- A modular vulnerability scanner with automatic report generation capabilities.☆914Updated last week
- 💀 Don't fear the Reaper 👻☆581Updated 2 weeks ago
- HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity to…☆1,504Updated this week
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆235Updated last year
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆322Updated 3 weeks ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,036Updated 3 weeks ago