MZAP is a multiple target ZAP Scanning / mzap is a tool for scanning N*N in ZAP.
Concept
Installation
$ go get -u github.com/hahwul/mzap
$ sudo snap install mzap –devmode
$ brew tap hahwul/mzap
$ brew install mzap
Usage
Usage:
mzap [command]
Available Commands:
ajaxspider Add AjaxSpider ZAP
ascan Add ActiveScan ZAP
help Help about any command
spider Add ZAP spider
stop Stop Scanning
version Show version
Flags:
–apikey string ZAP API Key / if you disable apikey, not use this option
–apis string ZAP API Host(s) address
e.g –apis http://localhost:8090,http://192.168.0.4:8090 (default “http://localhost:8090”)
–config string config file (default is $HOME/.mzap.yaml)
-h, –help help for mzap
–urls string URL list file / e.g –urls hosts.txt
$ mzap spider –urls sample/target.txt
INFO[0000] Start Prefix=/JSON/spider/action/scan/ Size of Target=17
INFO[0000] Added Target=”http://testphp.vulnweb.com/” ZAP API=”http://localhost:8090″
INFO[0000] Added Target=”http://www.hahwul.com” ZAP API=”http://localhost:8090″
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…