Whether you’re a penetration tester who wants to automate the mundane parts of testing, or you’re looking to speed up application scans with a particular tool, we’ve got you covered.Sign up here to get access to all of our libraries and scripts. What are you waiting for? Get to it!
Integrates with OWASP ZAP through its API. Use this library to create powerful test cases, and merge E2E test cases written with SeleniumLibrary or any other Robot Library to perform automated web app security scans.
Use this library to include vulnerability and port scanning as part of the continuous delivery pipe. Alternatively, use it to individually code-up a set of functions that perform automatic reconnaissance of apps.
Use this library to perform authenticated security scans along with functional automation scripts. Using the Arachni REST APIs, you can specify parameters like URL, proxy port and appropriate path to the Arachni REST server. Extract the results back in JSON format and integrated with a correlation engine to inspect it further.
Integrates with OWASP ZAP through its API. Use this library to create powerful test cases, and merge E2E test cases written with SeleniumLibrary or any other Robot Library to perform automated web app security scans.
A Python-based library for dirs3arch which allows penetration testers to automate their hosted environment reconnaissance and help QA teams include security test case scenarios as part of their automation framework.
These scripts can be configured depending on the attack type, such as fuzzing parameters, brute-forcing passwords, or cycling through page identifiers. Scripts provided in the repository: Payload automation (4 scripts) and 3 in 1 reconnaissance script