Burp Extension for a passive scanning JS files for endpoint links. This extension is designed to help security researchers and developers identify potential vulnerabilities in JavaScript code by scanning for endpoint links. The extension uses a combination of static analysis and dynamic analysis to identify potential vulnerabilities. It's a great tool for anyone who wants to improve the security of their web applications.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An AI-powered API security testing platform that performs continuous vulnerability assessment, attack surface mapping, and compliance monitoring of API endpoints.
Goof is a vulnerable Node.js demo application that includes a series of vulnerabilities and exploits
A serverless application that demonstrates common serverless security flaws and weaknesses
Protect your Fastify server against CSRF attacks with a series of utilities and recommendations for secure application development.
Curiefense is an application security platform that protects against various threats and offers community involvement.
Insider is a source code analysis tool focusing on OWASP Top 10 vulnerabilities with easy integration into DevOps pipelines.
A tool for identifying potential security vulnerabilities in web applications
A tool for detecting capabilities in executable files, providing insights into a program's behavior and potential malicious activities.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.