0ang3el / EasyCSRFLinks
☆162Updated 7 years ago
Alternatives and similar repositories for EasyCSRF
Users that are interested in EasyCSRF are comparing it to the libraries listed below
Sorting:
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆139Updated 4 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆259Updated 2 months ago
- XSS Hunter Burp Plugin☆150Updated 6 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆103Updated 7 years ago
- CVE-2017-9506 - SSRF☆189Updated 3 years ago
- SHELLING - a comprehensive OS command injection payload generator☆111Updated 6 years ago
- Facebook Bug Bounties☆102Updated 4 years ago
- Security checks pack for Burp Suite☆138Updated 7 years ago
- An interactive OOB XXE data exfiltration tool☆90Updated 8 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆220Updated 2 years ago
- Burp Bounty is a extension of Burp Suite that improve an active and passive scanner by yourself. This extension requires Burp Suite Pro.☆71Updated 3 years ago
- HTTP.ninja☆151Updated last year
- Burp Suite Extensions☆128Updated 12 years ago
- Resolve and quickly portscan a list of (sub)domains.☆87Updated 9 years ago
- ☆232Updated 9 years ago
- It's bloody scantastic☆237Updated 3 years ago
- ☆38Updated 5 years ago
- CVE-2018-7600 - Drupal 7.x RCE☆72Updated 7 years ago
- Web Application Security☆127Updated last year
- AWS Extender (Cloud Storage Tester) is a Burp plugin to assess permissions of cloud storage containers on AWS, Google Cloud and Azure.☆252Updated 3 years ago
- XXE Out of Band Server.☆170Updated last year
- Script to test if a server is vulnerable to the JetLeak vulnerability☆144Updated 9 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆48Updated 3 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- ☆71Updated 7 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Updated 11 years ago
- Fuzzing for LFI using Burpsuite☆63Updated 8 years ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago