nicholasaleks / graphql-threat-matrixLinks
GraphQL threat framework used by security professionals to research security gaps in GraphQL implementations
☆319Updated last month
Alternatives and similar repositories for graphql-threat-matrix
Users that are interested in graphql-threat-matrix are comparing it to the libraries listed below
Sorting:
- graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology…☆663Updated 2 months ago
- Security Auditor Utility for GraphQL APIs☆488Updated 6 months ago
- CrackQL is a GraphQL password brute-force and fuzzing utility.☆339Updated last year
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆383Updated last year
- GraphQL automated security testing toolkit☆324Updated last year
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆392Updated 2 years ago
- Burp Suite extension that offers a toolkit for testing GraphQL endpoints.☆195Updated last year
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆670Updated last year
- GQLSpection - parses GraphQL introspection schema and generates possible queries☆91Updated 5 months ago
- Awesome information for WebSockets security research☆275Updated 3 years ago
- 🕸️ Blazing fast GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce. 🕸️☆221Updated 2 years ago
- ☆183Updated 10 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆689Updated 4 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆317Updated last month
- A Security Tool for Enumerating WebSockets☆360Updated 3 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆274Updated 5 months ago
- ☆152Updated 2 years ago
- A Firefox Web Extension to improve the discovery of DOM XSS.☆277Updated 9 months ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆323Updated 8 months ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆232Updated 3 years ago
- ☆498Updated last year
- CT Log Scanner☆395Updated 4 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Updated 8 months ago
- Bambdas collection for Burp Suite Professional and Community.☆382Updated this week
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆135Updated 5 months ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆153Updated last week
- HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks☆187Updated 3 months ago
- A tool to inspect and attack version 1 GUIDs☆233Updated 2 years ago
- Automated learning of regexes for DNS discovery☆372Updated 2 years ago
- Rust-based high performance domain permutation generator.☆293Updated last year