You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Title: Building an Open-Source Network Scanning Tool
Description: We propose creating an open-source network scanning tool that combines essential features for security professionals and developers. Inspired by Burp Suite Community Edition, our goal is to provide a free and powerful alternative for network scanning and testing.
Features:
Port Scanning: The tool will perform comprehensive port scans to identify open ports on target systems.
Token Scanning: It will search for sensitive tokens (e.g., API keys, authentication tokens) in web traffic.
Complete DNS Lookup: Users can perform DNS lookups to resolve hostnames, IP addresses, and other domain-related information.
Vulnerability Scanner: The tool will detect common vulnerabilities such as Server-Side Request Forgery (SSRF), Cross-Site Request Forgery (CSRF), and more.
Intercept/Proxy Requests: Developers can intercept and modify HTTP requests using a built-in proxy. I am a CONTRIBUTOR in GSSoC'24
The text was updated successfully, but these errors were encountered:
Title: Building an Open-Source Network Scanning Tool
Description: We propose creating an open-source network scanning tool that combines essential features for security professionals and developers. Inspired by Burp Suite Community Edition, our goal is to provide a free and powerful alternative for network scanning and testing.
Features:
Port Scanning: The tool will perform comprehensive port scans to identify open ports on target systems.
Token Scanning: It will search for sensitive tokens (e.g., API keys, authentication tokens) in web traffic.
Complete DNS Lookup: Users can perform DNS lookups to resolve hostnames, IP addresses, and other domain-related information.
Vulnerability Scanner: The tool will detect common vulnerabilities such as Server-Side Request Forgery (SSRF), Cross-Site Request Forgery (CSRF), and more.
Intercept/Proxy Requests: Developers can intercept and modify HTTP requests using a built-in proxy.
I am a CONTRIBUTOR in GSSoC'24
The text was updated successfully, but these errors were encountered: