AonCyberLabs / BurpSuite-Team-Extension
This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes through your Burpsuite instance will be replicated in the history of the other testers and vice-versa!
☆23Updated 5 years ago
Alternatives and similar repositories for BurpSuite-Team-Extension
Users that are interested in BurpSuite-Team-Extension are comparing it to the libraries listed below
Sorting:
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 7 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 10 months ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- ☆56Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆41Updated 4 years ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 4 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- UglyEXe - bypass some AVs☆17Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- ☆17Updated 4 years ago
- Enumerate RIDs using pure Python☆31Updated 9 months ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Updated 4 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- F# Implementation to spawn shellcode☆47Updated 6 years ago