A tool for analyzing the attack surface of an application
☆19Mar 5, 2025Updated last year
Alternatives and similar repositories for attack-surface-analyzer
Users that are interested in attack-surface-analyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Feb 16, 2017Updated 9 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- OWASP ASVS Assessment Tool☆28Nov 6, 2018Updated 7 years ago
- ☆12Oct 31, 2022Updated 3 years ago
- Example signature files for drek.☆12Jan 10, 2018Updated 8 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- Audit Node Module folder with YARA rules to identify possible malicious packages hiding in node_moudles☆20Mar 24, 2021Updated 4 years ago
- A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management.☆88Updated this week
- A tracing Layer for syslog☆12Feb 13, 2026Updated last month
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- A plugin system for the Rhai embedded scripting language.☆17Mar 16, 2026Updated last week
- A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in☆21Dec 22, 2022Updated 3 years ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago
- Instrument a JavaScript class (or object) so that anytime a method function is called it gets logged to the console.☆35Oct 27, 2020Updated 5 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- 《深入理解IAST交互式应用安全测试》Interactive Application Security Testing.☆13Oct 20, 2022Updated 3 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- ☆49Mar 21, 2023Updated 3 years ago
- 🐑 Monitor the status of a folder on your system☆12Jan 13, 2026Updated 2 months ago
- An Android application, designed as a reference point, that implements an array of tamper and root detection methods - inspired by Google…☆15Jul 21, 2020Updated 5 years ago
- An express middleware that makes it easy to write web services that follow an Open API specification.☆17Mar 2, 2023Updated 3 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- Efficient sets of bytes for Rust☆18Jun 23, 2020Updated 5 years ago
- Web Application Firewall Test Script☆14Feb 28, 2023Updated 3 years ago
- ☆27Feb 19, 2026Updated last month
- CVE database☆21Sep 2, 2020Updated 5 years ago
- A chrome extension which blocks downloads based on their file extension / origin. Can be used to prevent HTML Smuggling attacks.☆18Mar 2, 2025Updated last year
- A simple authenticating proxy server written in node.js on top of express, passport, and node-http-proxy.☆15Jan 6, 2022Updated 4 years ago
- NodeJS bindings for Python's NLTK☆18May 26, 2015Updated 10 years ago
- A library to make detecting mounted state easier in Svelte☆11Feb 28, 2026Updated 3 weeks ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆19Mar 13, 2024Updated 2 years ago
- ☆21Sep 25, 2018Updated 7 years ago
- PHP implementation of Fowler's Notification pattern☆15Dec 27, 2014Updated 11 years ago
- Machine Learning Interface for Rust☆13Mar 18, 2025Updated last year
- Tor detect middleware for express☆14Dec 6, 2023Updated 2 years ago
- A very vulnerable serverless application in AWS Lambda☆98Oct 7, 2019Updated 6 years ago
- A collection of Material Design web components from the expand.js team☆15Jan 12, 2018Updated 8 years ago
- ViewState Payload Generator☆26Aug 17, 2018Updated 7 years ago
- Add health endpoints to your applications☆13Nov 15, 2019Updated 6 years ago