MZAP is a multiple target ZAP Scanning / mzap is a tool for scanning N*N in ZAP.
Concept
Installation
$ go get -u github.com/hahwul/mzap
$ sudo snap install mzap –devmode
$ brew tap hahwul/mzap
$ brew install mzap
Usage
Usage:
mzap [command]
Available Commands:
ajaxspider Add AjaxSpider ZAP
ascan Add ActiveScan ZAP
help Help about any command
spider Add ZAP spider
stop Stop Scanning
version Show version
Flags:
–apikey string ZAP API Key / if you disable apikey, not use this option
–apis string ZAP API Host(s) address
e.g –apis http://localhost:8090,http://192.168.0.4:8090 (default “http://localhost:8090”)
–config string config file (default is $HOME/.mzap.yaml)
-h, –help help for mzap
–urls string URL list file / e.g –urls hosts.txt
$ mzap spider –urls sample/target.txt
INFO[0000] Start Prefix=/JSON/spider/action/scan/ Size of Target=17
INFO[0000] Added Target=”http://testphp.vulnweb.com/” ZAP API=”http://localhost:8090″
INFO[0000] Added Target=”http://www.hahwul.com” ZAP API=”http://localhost:8090″
Your malware's favorite sandbox - where red teamers come to bury their payloads. A sandbox…
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new…
This article delves into our comprehensive training program designed to teach you the intricacies of…
BloodHound.py is a Python based ingestor for BloodHound, based on Impacket. The code in this…
In 2025 I wanted to try something new. In addition to a traditional 100 days…
presenterm lets you create presentations in markdown format and run them from your terminal, with…