This extension provide a Python panel for writing custom proxy script.
☆16Aug 26, 2019Updated 6 years ago
Alternatives and similar repositories for BurpScripterPlus
Users that are interested in BurpScripterPlus are comparing it to the libraries listed below
Sorting:
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- ☆14Mar 8, 2023Updated 2 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- Capture The Flag Information☆12Dec 7, 2018Updated 7 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆18Dec 28, 2017Updated 8 years ago
- Data anonymization & masking of sensitive information in a relational database. Auto detection of sensitive data.☆29Nov 14, 2024Updated last year
- The home of the SDDLMaker☆28Jan 13, 2025Updated last year
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 5 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- ☆98Feb 21, 2019Updated 7 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 7 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ELF patching library in Python☆24Mar 15, 2021Updated 4 years ago
- ☆23May 19, 2019Updated 6 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Jun 26, 2020Updated 5 years ago
- ☆58Jun 2, 2025Updated 9 months ago
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 6 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- ☆10Updated this week
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- 基于AI的BurpSuite漏洞分析插件☆11Sep 21, 2023Updated 2 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 6 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- ☆34Apr 25, 2021Updated 4 years ago
- VulnMapAI combines the power of nmap’s detailed network scanning and the advanced natural language processing capabilities of GPT-4 to ge…☆32Oct 18, 2023Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- Chrome extension which sets cookies in bulk from raw header text☆13Mar 2, 2023Updated 3 years ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- RDPThief donut shellcode inject into mstsc☆88May 24, 2021Updated 4 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 10 months ago