Dynamic-Mobile-Security / burp-har-importerLinks
☆12Updated 3 years ago
Alternatives and similar repositories for burp-har-importer
Users that are interested in burp-har-importer are comparing it to the libraries listed below
Sorting:
- Tool to extract & validate google fcm server keys from apks☆29Updated 4 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆17Updated 4 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 3 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- HTTP requests of FrontPage expolit☆25Updated 11 years ago
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Updated last year
- Security test tool for Blind XSS☆26Updated 5 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15Updated 5 years ago
- Noob Penetration tester☆11Updated last year
- ☆30Updated last year
- ☆36Updated 5 months ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 5 months ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- XSS scanning with Dalfox on Github-action☆25Updated last year
- Extract subdomains from rapiddns.io☆23Updated 2 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Updated 3 years ago
- ☆22Updated 2 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated 2 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- Return domains in CSP headers in http response☆15Updated 3 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 4 years ago
- Simple tools to handle string and generate subdomain permutations☆15Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 4 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated last year
- convert secret patterns to gf compatible.☆39Updated 2 years ago