owasp-noir / noirLinks
Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.
☆938Updated this week
Alternatives and similar repositories for noir
Users that are interested in noir are comparing it to the libraries listed below
Sorting:
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbit…☆672Updated 3 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆714Updated 2 weeks ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆696Updated last year
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆850Updated this week
- ☆528Updated 2 weeks ago
- Security Auditor Utility for GraphQL APIs☆553Updated 3 weeks ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆396Updated 7 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆433Updated 3 weeks ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆970Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,269Updated 4 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆462Updated last year
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆743Updated this week
- GitHub Actions Pipeline Enumeration and Attack Tool☆717Updated 2 months ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,278Updated 4 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,707Updated last year
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆375Updated last year
- Header Exploitation HTTP☆687Updated last week
- AI-powered ffuf wrapper☆556Updated last week
- ProjectDiscovery's Open Source Tool Manager☆1,002Updated 3 weeks ago
- graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology…☆773Updated 6 months ago
- CSPBypass.com, a tool designed to help ethical hackers bypass restrictive Content Security Policies (CSP) and exploit XSS (Cross-Site Scr…☆509Updated last month
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆695Updated 6 months ago
- Unleash the power of cloud☆813Updated last year
- Fast and customizable subdomain wordlist generator using DSL☆892Updated 3 weeks ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆731Updated last year
- ☆510Updated last year
- Discover new target domains using Content Security Policy☆494Updated this week
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆446Updated 2 years ago
- A Security Tool for Enumerating WebSockets☆364Updated 3 years ago
- ☆315Updated 5 months ago