synack / apiLinks
API for Asset Service
☆12Updated 11 months ago
Alternatives and similar repositories for api
Users that are interested in api are comparing it to the libraries listed below
Sorting:
- Vulnerable Windows Application☆17Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 6 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- ☆37Updated last month
- ☆27Updated 2 years ago
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- A python3 script searching for secret on swaggerhub☆67Updated 3 years ago
- Unicode Security Toolkit☆37Updated 9 months ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆30Updated 8 months ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Information Security Information From Web☆27Updated 10 months ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 10 months ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆55Updated 8 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- ☆11Updated 6 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Bcheck scripts for Burp☆28Updated 11 months ago
- Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.☆33Updated 3 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- Fast website scraper and wordlist generator☆81Updated 2 months ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated 9 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- ☆45Updated 5 months ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Updated 3 years ago
- Checks if files is accessible based on the source code.☆16Updated last year
- ☆26Updated 3 years ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆77Updated last year