Burp Suite Professional extension in Java for Tabnabbing attack
☆13May 8, 2018Updated 7 years ago
Alternatives and similar repositories for burp-tabnabbing-extension
Users that are interested in burp-tabnabbing-extension are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- little scripts of bash stuff that i've found handy.☆16Feb 2, 2019Updated 7 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Oct 8, 2017Updated 8 years ago
- ☆11May 27, 2021Updated 4 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Jan 8, 2017Updated 9 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated 2 weeks ago
- K-PaaS 컨테이너 플랫폼☆12Oct 17, 2023Updated 2 years ago
- Skattered tools from Skatterbrainz☆14Jan 7, 2019Updated 7 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Jul 9, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- A pattern for client/server communication via Named Pipes via C#☆98Aug 8, 2018Updated 7 years ago
- Weekly learning session/documentation☆14Sep 26, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Dec 10, 2015Updated 10 years ago
- A full rewrite of Red Petya ransomware from 2016 with full MBR and GPT support☆24Jul 12, 2022Updated 3 years ago
- ☆18Dec 12, 2020Updated 5 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago
- Wrap radamsa on OSX, add instrumentation / triage.☆15Apr 22, 2016Updated 9 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Utilities for creating Burp Suite Extensions.☆21Oct 31, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Efficient, flexible, and accurate client-side file identification tool☆20Aug 21, 2013Updated 12 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- This project is an AES loader for c2 shellcode☆36Jan 24, 2024Updated 2 years ago
- ☆29Jan 15, 2017Updated 9 years ago
- Collection of changes for making TF2 less hardcoded has possible.☆22Updated this week
- Open Source - Common Findings DataBase (JSON & MD)☆67May 9, 2022Updated 3 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 8 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Windows Crypter/Decrypter Generator with AES 256 bits key☆31Dec 17, 2018Updated 7 years ago
- Brute forcing scripts for bad CTF problems☆47May 18, 2020Updated 5 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- ☆18Dec 12, 2022Updated 3 years ago
- ☆12May 8, 2018Updated 7 years ago
- 👊 A small utility to play with IBM MQ☆67May 23, 2023Updated 2 years ago