☆20Dec 29, 2024Updated last year
Alternatives and similar repositories for burpGPTplus
Users that are interested in burpGPTplus are comparing it to the libraries listed below
Sorting:
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated last year
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆56Jan 14, 2025Updated last year
- This tool is intended for bounty hunters, the script installs and launches the best set of tools for expanding the attack surface, for W…☆12Apr 22, 2024Updated last year
- ☆14Mar 3, 2024Updated 2 years ago
- A productivity burp extension which reminds to take break while you are at work!☆18May 31, 2020Updated 5 years ago
- ☆16Mar 29, 2024Updated last year
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- BugBounty Hub: Your one-stop destination for Bug Bounty excellence! Explore Nuclei Templates and BugBounty Worldlists for comprehensive …☆16Apr 3, 2025Updated 11 months ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- A burp extension, check Sturts2 RCE through passive scan.一款检测Struts2 RCE漏洞的burp被动扫描插件~☆15Dec 9, 2020Updated 5 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Websites and tools for OSINT investigations pertaining to Israel☆26May 12, 2025Updated 9 months ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Tool for enumerating Active Directory environments☆48Aug 10, 2023Updated 2 years ago
- Tool queries the OpenAI API to enhance the description, impact, and recommendation keys of a nuclei template.☆21Apr 1, 2023Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.☆309Jul 9, 2024Updated last year
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆67Oct 1, 2022Updated 3 years ago
- In this repo, I have created a subdomain enumeration function that grab subdomains in deep.☆23Mar 19, 2023Updated 2 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- Ollama AI Analyzer runs directly on your local computer, using Ollama's AI models to analyze your HTTP requests and responses. This means…☆32Mar 1, 2025Updated last year
- ☆33Apr 20, 2023Updated 2 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- ☆10Feb 12, 2026Updated 3 weeks ago
- Enumerate a target Based off of Nmap Results☆76Oct 25, 2023Updated 2 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- A path-normalization pentesting tool.☆151Jan 22, 2026Updated last month
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆41Aug 23, 2024Updated last year
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- A quick and dirty (and a little shitty) burp extension that uses cheap deepseek api to send request and response and maybe found somethin…☆34Jan 26, 2025Updated last year
- Wordlists for intelligent directory brute-forcing☆33Sep 28, 2021Updated 4 years ago
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 2 years ago
- OWASP Foundation web repository☆16Oct 11, 2025Updated 4 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86May 5, 2023Updated 2 years ago