10goto20 / seltzerLinks
A Burp Suite extension for headless, unattended scanning.
☆36Updated 5 years ago
Alternatives and similar repositories for seltzer
Users that are interested in seltzer are comparing it to the libraries listed below
Sorting:
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 4 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆41Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- ☆22Updated 3 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated last year
- ☆36Updated 7 months ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- ☆19Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 4 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91Updated 5 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆19Updated 5 years ago
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- ☆26Updated 3 years ago
- Default plugins for Jaeles Scanner☆34Updated 4 years ago
- DO NOT RUN THIS.☆47Updated 3 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆17Updated 5 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 4 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆44Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 3 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆55Updated 4 years ago