nicholasaleks / graphql-threat-matrixLinks
GraphQL threat framework used by security professionals to research security gaps in GraphQL implementations
☆309Updated last month
Alternatives and similar repositories for graphql-threat-matrix
Users that are interested in graphql-threat-matrix are comparing it to the libraries listed below
Sorting:
- graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology…☆643Updated last month
- Security Auditor Utility for GraphQL APIs☆470Updated 3 months ago
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆363Updated last year
- Burp Suite extension that offers a toolkit for testing GraphQL endpoints.☆192Updated 10 months ago
- CrackQL is a GraphQL password brute-force and fuzzing utility.☆335Updated 10 months ago
- GraphQL automated security testing toolkit☆318Updated last year
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆386Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆641Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆655Updated last month
- A curated list of awesome GraphQL Security frameworks, libraries, software and resources☆335Updated last year
- GQLSpection - parses GraphQL introspection schema and generates possible queries☆87Updated 3 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆312Updated 6 months ago
- 🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️☆215Updated 2 years ago
- ☆204Updated last year
- Burp extension to create target specific and tailored wordlist from burp history.☆239Updated 3 years ago
- Prototype pollution scanner using headless chrome☆218Updated 2 years ago
- A Security Tool for Enumerating WebSockets☆349Updated 3 years ago
- Automated learning of regexes for DNS discovery☆369Updated 2 years ago
- PP-finder Help you find gadget for prototype pollution exploitation☆163Updated 9 months ago
- ☆176Updated 7 months ago
- Unofficial documentation for the great tool Param Miner☆178Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆316Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆261Updated 2 months ago
- ☆489Updated last year
- ☆152Updated last year
- ☆454Updated 4 months ago
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆286Updated last year
- Blazing fast GraphQL discovery & fingerprinting toolbox.☆112Updated last year
- Smart context-based SSRF vulnerability scanner.☆351Updated 3 years ago
- ☆409Updated 4 years ago