Classic Meets Cutting-Edge We’ve taken the tools you rely on and enhanced them to simplify your security tasks, making your workday more productive and less complicated. InterceptProxy and view HTTP requests in real-time as you browse ReplayResend existing and custom requests to manually test endpoints AutomateCustomize and test requests against large wordlists SitemapGet a real-time visualization of your website's structure Match & ReplaceAutomatically modify incoming requests with regex rules ConvertCreate your own custom encoders/decoders Plugins, SimplifiedExtending your tool doesn't have to be painful. Our workflow system allows you to customize Caido with minimal code required.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
APKiD is a tool that identifies compilers, packers, obfuscators, and other weird stuff in APK files.
SearchCode is an extensive code search engine that indexes 75 billion lines of code from millions of projects to help developers find coding examples and libraries.
A modular Python tool that obfuscates Android applications by manipulating decompiled smali code, resources, and manifest files without requiring source code access.
A source code search engine for searching alphanumeric snippets, signatures, or keywords in web page HTML, JS, and CSS code.
An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.
Grafeas is an API specification for managing and auditing metadata about software resources across the software supply chain.
A brute-force protection middleware for express routes that rate-limits incoming requests.
RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.
Bearer CLI is a static application security testing tool that scans source code across multiple programming languages to identify and prioritize OWASP Top 10 and CWE Top 25 security vulnerabilities through data flow analysis.