Anof-cyber / Pentest-MapperLinks
A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabilities
☆116Updated 2 years ago
Alternatives and similar repositories for Pentest-Mapper
Users that are interested in Pentest-Mapper are comparing it to the libraries listed below
Sorting:
- ☆57Updated last year
- Striping CDN & WAF IPs from a list of IP Addresses☆79Updated 2 months ago
- Sample Obsidian's vault for web pentesting☆98Updated 11 months ago
- Find related domains of a given domain.☆101Updated 2 years ago
- HTTP verb tampering & methods enumeration☆62Updated 3 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated last year
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆75Updated last year
- Execute Trickest workflows right from your terminal☆93Updated 3 weeks ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆55Updated 9 months ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- ☆157Updated 3 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆163Updated 2 years ago
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆118Updated last year
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆182Updated 2 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆61Updated 2 months ago
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 3 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆25Updated last year
- Apache Tomcat exploit and Pentesting guide for penetration tester☆61Updated 2 years ago
- A set of open-source community scripts☆63Updated 9 months ago
- Wordlist for Hacking, Penetration Testing, Vulnerability Assessments and More☆64Updated 11 months ago
- A burp suite extension that enumerates infrastructure and application admin interfaces (OTG-CONFIG-005)☆121Updated 3 years ago
- ☆76Updated last year
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆77Updated last year
- 🔭 Collection of regexp pattern for security passive scanning☆114Updated 2 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆39Updated 3 months ago
- Some contributions in the nuclei-templates repository☆59Updated 3 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆44Updated last year