MZAP is a multiple target ZAP Scanning / mzap is a tool for scanning N*N in ZAP.
Concept
Installation
$ go get -u github.com/hahwul/mzap
$ sudo snap install mzap –devmode
$ brew tap hahwul/mzap
$ brew install mzap
Usage
Usage:
mzap [command]
Available Commands:
ajaxspider Add AjaxSpider ZAP
ascan Add ActiveScan ZAP
help Help about any command
spider Add ZAP spider
stop Stop Scanning
version Show version
Flags:
–apikey string ZAP API Key / if you disable apikey, not use this option
–apis string ZAP API Host(s) address
e.g –apis http://localhost:8090,http://192.168.0.4:8090 (default “http://localhost:8090”)
–config string config file (default is $HOME/.mzap.yaml)
-h, –help help for mzap
–urls string URL list file / e.g –urls hosts.txt
$ mzap spider –urls sample/target.txt
INFO[0000] Start Prefix=/JSON/spider/action/scan/ Size of Target=17
INFO[0000] Added Target=”http://testphp.vulnweb.com/” ZAP API=”http://localhost:8090″
INFO[0000] Added Target=”http://www.hahwul.com” ZAP API=”http://localhost:8090″
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…