Skip to main content

attack api is a cli tool to find security vulnerabilities in an API.

Project description

attackapi

attack api is a cli tool to find security vulnerabilities in an API.

It uses mitmproxy to setup proxy and syntribos to detect vulnerabilities in API. To find security vulnerabilities a mobile app or web app, use attackapi as proxy and just visit all the pages/api which needs to be checked.

Installation

$ pip install attackapi

attackapi uses redis to store requests and for inter process communication. Make sure redis is installed and running on your system.

Usage

To see help

$ attackapi --help

To start a proxy and attack API

$ attackapi run

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

attackapi-0.1.2.tar.gz (4.6 kB view details)

Uploaded Source

File details

Details for the file attackapi-0.1.2.tar.gz.

File metadata

  • Download URL: attackapi-0.1.2.tar.gz
  • Upload date:
  • Size: 4.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No

File hashes

Hashes for attackapi-0.1.2.tar.gz
Algorithm Hash digest
SHA256 66d1bb995e41bba42c546cedb3cff70fbfb5af10258b119ad0c378b05a88c186
MD5 c997f784d59369afaec1ce072743e411
BLAKE2b-256 6122fb664b6ec24a6a649bd7376566e47beb8e9cb80d3e40c5488930c8a37b16

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page