-
Notifications
You must be signed in to change notification settings - Fork 400
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expand the owasp branch with more web application attacks/scans #28
Comments
Still want some help? I just faced this tool and it seems that no big updates have been done since 2018 🤔 |
Sure! I really can't find the time to invest in the project (or any others tbh) but I would love for you to contribute. |
I was thinking of continue your efforts in implement the remainder of owasp top 10..
|
Honestly I didn't get by to finish any of the above. The project started as a recon tool with a plan to expand further later. |
I started coding some attacks/scans into Raccoon - this is done in the
owasp
branch.This is supposed to broaden its vulnerability scanning abilities and help it assist with areas it is not addressing fully at the moment.
I have coded most/all of the directory traversal module but I currently have no time to add more scans and attacks from the web application world, let alone write unit tests for the existing ones.
I'd love to get assistance on this, from simple suggestions in this issue to proper PRs - everything is appreciated.
On a side note, I started working on an XSS module as part of this branch but decided to drop it. I don't believe XSS is a good fit for an automated scan. XSS is something that is best done manually - with implications being observed by the attacker immediately, while detecting them using an automated tool is a lot harder and can have a ton of false positives/negatives.
The text was updated successfully, but these errors were encountered: