payatu / Tiredful-API
An intentionally designed broken web application based on REST API.
☆574Updated 3 years ago
Alternatives and similar repositories for Tiredful-API:
Users that are interested in Tiredful-API are comparing it to the libraries listed below
- A REST API security testing framework.☆327Updated 3 years ago
- A security tool for grabbing screenshots of many web hosts☆316Updated 7 years ago
- Various Tools and Docker Images☆279Updated 6 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆468Updated 5 years ago
- Vulners Python API wrapper☆359Updated 2 weeks ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆481Updated 6 years ago
- Fuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem☆649Updated 4 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆412Updated last year
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆380Updated 7 years ago
- A simple CORS misconfiguration scanner☆411Updated 4 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆733Updated 2 years ago
- A database of common, interesting or useful commands, in one handy referable form☆747Updated last year
- Multi Tool Subdomain Enumeration☆725Updated 3 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆634Updated 6 years ago
- REST/JSON API to the Burp Suite security tool.☆552Updated 9 months ago
- Scripts that are useful for me on pen tests☆525Updated 2 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆455Updated 3 years ago
- ☆275Updated 3 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆557Updated 2 years ago
- Ephemera and other documentation associated with the 1337list project.☆396Updated 6 years ago
- DNS Rebinding Exploitation Framework☆488Updated 3 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆349Updated 4 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Updated 7 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Updated 4 years ago
- A wiki focusing on aggregating and documenting various SQL injection methods☆773Updated 10 months ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆315Updated 5 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆304Updated 6 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆317Updated 2 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆319Updated 7 years ago