The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
☆66Apr 11, 2023Updated 2 years ago
Alternatives and similar repositories for attack-surface-detector-zap
Users that are interested in attack-surface-detector-zap are comparing it to the libraries listed below
Sorting:
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆110Dec 17, 2023Updated 2 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 6 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Automated tool for domains & Subdomains Gathering☆14Updated this week
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.☆33Mar 13, 2018Updated 7 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- ☆15Aug 25, 2023Updated 2 years ago
- A framework for automating penetration testing using a plugin based architecture☆41May 20, 2022Updated 3 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 2 weeks ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- Database interaction layer to store the Open Asset Model in a database management system☆21Feb 20, 2026Updated last week
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- A tool for identifying misconfigured CloudFront domains☆17Apr 27, 2018Updated 7 years ago
- Forked MaruOS installer for Nethunter☆17Feb 16, 2018Updated 8 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last month
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆120Apr 26, 2021Updated 4 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆21Apr 11, 2024Updated last year
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- ☆34Oct 1, 2019Updated 6 years ago
- This repository will teach you have to do my talk "Pushing Left, Like a Boss".☆71Jan 1, 2022Updated 4 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- ☆45Aug 27, 2024Updated last year
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 6 years ago
- A Java library for parsing and programmatically using threat models☆82Feb 15, 2023Updated 3 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆15Sep 8, 2020Updated 5 years ago
- ☆17May 7, 2021Updated 4 years ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago