Burp Suite extension that extends Burp to support storing and reusing variables in requests
☆26Feb 10, 2026Updated 3 weeks ago
Alternatives and similar repositories for burp_variables
Users that are interested in burp_variables are comparing it to the libraries listed below
Sorting:
- The Golang-based library for packet manipulation and dissection☆10Mar 10, 2024Updated last year
- Burp Suite Extension with MCP Server to enhance manual application security testing☆34Jan 21, 2026Updated last month
- PyBurp is a Burp Suite extension that provides predefined Python functions for HTTP/WebSocket traffic modification, context menu registra…☆38Dec 28, 2025Updated 2 months ago
- 一款支持检测web应用程序未授权访问缺陷的burp suite插件,可自定义配置检测字段以及返回包json数据分析☆12Apr 22, 2024Updated last year
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- ☆11Aug 25, 2018Updated 7 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- A FullC2 Framework TUI + Web UI That Focuses On Network Stressing☆14Aug 24, 2025Updated 6 months ago
- 申明:仅供教学演示,禁用非法、未授权等进行钓鱼,后果自负。☆12May 21, 2024Updated last year
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- 一款集成了Nuclei模板管理、多空间引擎搜索的网络安全工具集。为安全研究人员提供高效的工作体验。☆22Feb 12, 2026Updated 3 weeks ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 weeks ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- ☆11Jul 27, 2023Updated 2 years ago
- Scanner for misconfigured DevSecOps or Security tools on internet like SonarQube, GoPhish etc.☆12Apr 4, 2025Updated 11 months ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- ☆16Jan 23, 2026Updated last month
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 4 months ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 6 months ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- A common database library for managing and querying security data☆18Jan 12, 2026Updated last month
- ☆12Apr 17, 2022Updated 3 years ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 10 months ago
- Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode)☆14Feb 3, 2024Updated 2 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- Advanced JWT decoding & cracking toolkit with a user-friendly UI for security testing☆48Jan 18, 2026Updated last month
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆26Jun 24, 2025Updated 8 months ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated 11 months ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Writeup Template. Feel free to replicate but please give me credit!☆14Nov 7, 2025Updated 3 months ago