payatu / Tiredful-APILinks
An intentionally designed broken web application based on REST API.
☆575Updated 4 years ago
Alternatives and similar repositories for Tiredful-API
Users that are interested in Tiredful-API are comparing it to the libraries listed below
Sorting:
- A REST API security testing framework.☆326Updated 3 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Updated 5 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆745Updated 3 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆480Updated 7 years ago
- A security tool for grabbing screenshots of many web hosts☆321Updated 8 years ago
- Vulners Python API wrapper☆365Updated last week
- Fuzzapi is a tool used for REST API pentesting and uses API_Fuzzer gem☆659Updated 4 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆415Updated last year
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆381Updated 7 years ago
- A simple CORS misconfiguration scanner☆419Updated 4 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆354Updated 4 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 5 years ago
- $50 Million CTF from Hackerone - Writeup☆595Updated 6 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆564Updated 2 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆633Updated 6 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆258Updated 3 years ago
- Multi Tool Subdomain Enumeration☆725Updated 4 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated 2 years ago
- ☆276Updated 3 years ago
- DNS Rebinding Exploitation Framework☆491Updated 4 years ago
- ☆327Updated 7 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆420Updated 2 months ago
- Various Tools and Docker Images☆280Updated 3 months ago
- A database of common, interesting or useful commands, in one handy referable form☆749Updated last year
- Pillage web accessible GIT, HG and BZR repositories☆320Updated 8 years ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆317Updated 6 years ago
- Damn Vulnerable Web Services is an insecure web application with multiple vulnerable web service components that can be used to learn rea…☆456Updated 3 years ago
- CTFs, solutions and presentations☆290Updated 3 months ago
- Ephemera and other documentation associated with the 1337list project.☆395Updated 7 years ago
- ☆607Updated 10 months ago