MZAP is a multiple target ZAP Scanning / mzap is a tool for scanning N*N in ZAP.
Concept
Installation
$ go get -u github.com/hahwul/mzap
$ sudo snap install mzap –devmode
$ brew tap hahwul/mzap
$ brew install mzap
Usage
Usage:
mzap [command]
Available Commands:
ajaxspider Add AjaxSpider ZAP
ascan Add ActiveScan ZAP
help Help about any command
spider Add ZAP spider
stop Stop Scanning
version Show version
Flags:
–apikey string ZAP API Key / if you disable apikey, not use this option
–apis string ZAP API Host(s) address
e.g –apis http://localhost:8090,http://192.168.0.4:8090 (default “http://localhost:8090”)
–config string config file (default is $HOME/.mzap.yaml)
-h, –help help for mzap
–urls string URL list file / e.g –urls hosts.txt
$ mzap spider –urls sample/target.txt
INFO[0000] Start Prefix=/JSON/spider/action/scan/ Size of Target=17
INFO[0000] Added Target=”http://testphp.vulnweb.com/” ZAP API=”http://localhost:8090″
INFO[0000] Added Target=”http://www.hahwul.com” ZAP API=”http://localhost:8090″
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…