michelin / ChopChopLinks
ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.
☆712Updated 2 years ago
Alternatives and similar repositories for ChopChop
Users that are interested in ChopChop are comparing it to the libraries listed below
Sorting:
- Awesome cloud enumerator☆1,091Updated 11 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆996Updated 2 weeks ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆491Updated 2 years ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆426Updated 2 months ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆404Updated 4 years ago
- A fully automated, reliable, super-fast, scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆397Updated last year
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆775Updated last year
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆270Updated 2 years ago
- Go client to communicate with Chaos DB API.☆815Updated last week
- Golang client for querying SecurityTrails API data☆581Updated 3 weeks ago
- A Security Tool for Enumerating WebSockets☆365Updated 4 years ago
- Convolutional neural network for analyzing pentest screenshots☆1,278Updated last year
- Scan only once by IP address and reduce scan times with Nmap for large amounts of data.☆393Updated 6 months ago
- PwnMachine is a self hosting solution based on docker aiming to provide an easy to use pwning station for bug hunters.☆324Updated last year
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆453Updated last year
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆553Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆975Updated 2 years ago
- MassDNS wrapper written in go to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard filtering…☆1,585Updated last week
- Organize your API security assessment by using MindAPI. It's free and open for community collaboration.☆859Updated 4 months ago
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and…☆802Updated 2 years ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆965Updated last year
- Check any website (or set of websites) for insecure security headers.☆255Updated 2 years ago
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆548Updated 2 weeks ago
- Vulnerability Scan with Nuclei☆277Updated last week
- Damn Vulnerable Web Services is a vulnerable application with a web service and an API that can be used to learn about webservices/API re…☆503Updated 2 weeks ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆519Updated 3 years ago
- Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security prof…☆416Updated 5 years ago
- Subdomain finder☆372Updated last year
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆776Updated 3 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆642Updated 7 months ago