A Burp plugin to export findings to DefectDojo
☆31Nov 7, 2023Updated 2 years ago
Alternatives and similar repositories for Burp-Plugin
Users that are interested in Burp-Plugin are comparing it to the libraries listed below
Sorting:
- DefectDojo Documentation☆17Oct 10, 2021Updated 4 years ago
- Python API library for DefectDojo☆43Feb 24, 2023Updated 3 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- @echo off color 1b cls @echo off color 1b cls set /p "A=>Password:" cls if %A%==moon goto desktop1 goto password :desktop1 cls col…☆15Nov 21, 2020Updated 5 years ago
- Golang installer for DefectDojo☆29Jan 23, 2025Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Dec 20, 2018Updated 7 years ago
- Python API and REST API for the Checkmarx WSDL☆13Feb 11, 2016Updated 10 years ago
- ☆16Jul 1, 2023Updated 2 years ago
- Sample scan files for testing DefectDojo imports☆86Aug 25, 2025Updated 6 months ago
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- ☆12Mar 10, 2026Updated last week
- Python 3 script for interacting with Shodan API☆20Nov 4, 2024Updated last year
- Steemit Account Creation Web Application☆24Mar 3, 2026Updated 2 weeks ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- An AWS cross-account tool to support human access with MFA for the CLI and GUI.☆19Oct 16, 2018Updated 7 years ago
- Geolocate your files!☆16Jan 7, 2022Updated 4 years ago
- Credentials recovery project☆11May 12, 2015Updated 10 years ago
- Wordpress.org svn repositories spider☆12Aug 4, 2014Updated 11 years ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- 👨🏼💻 Brute force wifi passwords with AppleScript.☆14Jan 7, 2020Updated 6 years ago
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automati…☆29Aug 17, 2022Updated 3 years ago
- The future of the decentralized internet begins with the community [L0]☆10Nov 4, 2017Updated 8 years ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- TheRomanXpl0it is an italian academic CTF team from Sapienza, University of Rome.☆14Jan 30, 2026Updated last month
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- The shards of code that will soon become the next GooDork version☆17Mar 6, 2013Updated 13 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- A sCrypt based miner for litecoins written in Java☆26Nov 18, 2011Updated 14 years ago
- ☆17May 7, 2021Updated 4 years ago
- ☆12Jan 3, 2018Updated 8 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- Open Security Summit 2019☆26Nov 16, 2020Updated 5 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago