GovTech-CSG / ProxyAgentLinks
☆65Updated 4 years ago
Alternatives and similar repositories for ProxyAgent
Users that are interested in ProxyAgent are comparing it to the libraries listed below
Sorting:
- ☆29Updated 3 years ago
- ☆95Updated 4 years ago
- ☆87Updated last year
- ☆16Updated 2 months ago
- A simple remote scanner for Atlassian Jira☆121Updated 3 years ago
- Compiles a list of major CDN and WAF subnets.☆67Updated last week
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- ☆56Updated 4 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 4 years ago
- This repository contains all the examples related to a series of tutorials that demonstrate how to use the new Montoya API of Burp Suite …☆47Updated last month
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆56Updated 2 years ago
- Burp extension to generate multi-step CSRF POC.☆31Updated 6 years ago
- ☆170Updated 4 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36Updated 3 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- Copy as XMLHttpRequest BurpSuite extension☆32Updated 4 years ago
- ☆17Updated 3 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 8 months ago
- Gopher Tomcat Deployer☆48Updated 7 years ago
- ☆36Updated last year
- Burp Bounty profiles☆81Updated 4 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Burp Extension that copies a request and builds a FFUF skeleton☆112Updated 2 years ago
- ☆45Updated 5 years ago
- ☆36Updated 5 years ago
- ☆75Updated last year
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Updated 4 years ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago