Anof-cyber / Pentest-Mapper
A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabilities
☆112Updated last year
Alternatives and similar repositories for Pentest-Mapper:
Users that are interested in Pentest-Mapper are comparing it to the libraries listed below
- Custom scan profiles for use with Burp Suite Pro☆122Updated 11 months ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆29Updated last year
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- HTTP verb tampering & methods enumeration☆56Updated 2 years ago
- Sample Obsidian's vault for web pentesting☆96Updated 6 months ago
- HTTP parameter discovery suite.☆61Updated 4 years ago
- Striping CDN IPs from a list of IP Addresses☆75Updated 2 years ago
- ☆52Updated 2 years ago
- ☆68Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆113Updated 2 months ago
- ☆155Updated last year
- Simple fork from degoogle original project with bug hunting purposes☆87Updated 2 years ago
- ☆87Updated 3 years ago
- ☆54Updated 9 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆120Updated 2 years ago
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆91Updated 3 years ago
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆126Updated 8 months ago
- Find related domains of a given domain.☆97Updated last year
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆131Updated 5 months ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆44Updated 2 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 2 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆181Updated 2 years ago
- Advanced Reconnaissance and Web Application Discovery☆79Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated 2 years ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆53Updated 4 months ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆86Updated last year
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆33Updated 6 months ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆71Updated 10 months ago