GovTech-CSG / AutowaspLinks
BurpSuite Extension: A one-stop pen testing checklist and logger tool
☆75Updated 2 years ago
Alternatives and similar repositories for Autowasp
Users that are interested in Autowasp are comparing it to the libraries listed below
Sorting:
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- ☆48Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- ☆76Updated 4 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 4 years ago
- ☆90Updated 3 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 4 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆45Updated last year
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated last year
- ☆67Updated 6 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated last year
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆55Updated 4 years ago
- A list of "secrets" from JWT sample code and readme files.☆56Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- REST API backend for Reconmap☆47Updated this week
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆50Updated 2 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- ☆36Updated 7 months ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- ☆38Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 4 years ago
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- Burp extension for quickly copying request/response data.☆30Updated 2 weeks ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆113Updated 3 years ago
- A simple tool to detect wildcards domain based on Amass's wildcards detector.☆64Updated 4 years ago