☆65Dec 9, 2021Updated 4 years ago
Alternatives and similar repositories for ProxyAgent
Users that are interested in ProxyAgent are comparing it to the libraries listed below
Sorting:
- ☆73Nov 22, 2021Updated 4 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- BOR - Break On Request, is a burp extension that provides a custom context menu for marking requests to be stopped by the interceptor wit…☆13Nov 18, 2022Updated 3 years ago
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- ☆20Sep 6, 2023Updated 2 years ago
- Slides and other material from various conference presentations.☆46Sep 10, 2025Updated 6 months ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated last month
- ☆19Oct 5, 2020Updated 5 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- WILSON Cloud Respwnder is a Web Interaction Logger Sending Out Notifications with the ability to serve custom content in order to appropr…☆50Feb 27, 2026Updated 2 weeks ago
- Burp extension to allow you to highlight Repeater tabs.☆10Jun 14, 2021Updated 4 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆189Aug 11, 2022Updated 3 years ago
- Nuclei Templates to reproduce Cracking the lens's Research☆131Jan 8, 2022Updated 4 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Exploitation toolkit for RichFaces☆106Nov 3, 2023Updated 2 years ago
- 个人使用的一款脚本提权扫描器☆19Sep 6, 2020Updated 5 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- Automatic credential collection☆21Aug 17, 2022Updated 3 years ago
- weaponized tool for CVE-2020-17144☆158Dec 9, 2020Updated 5 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆124Aug 20, 2023Updated 2 years ago
- Copy as XMLHttpRequest BurpSuite extension☆32Mar 29, 2021Updated 4 years ago
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆139Sep 21, 2020Updated 5 years ago
- jolokia-exploitation-toolkit☆311Dec 19, 2024Updated last year
- 反编译微信小程序, 支持分包☆20Jun 21, 2019Updated 6 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆176Oct 26, 2024Updated last year
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- ☆38Aug 19, 2021Updated 4 years ago
- An extension to use Semgrep inside Burp Suite.☆88May 23, 2025Updated 9 months ago
- ☆239Apr 20, 2019Updated 6 years ago
- FOFA 图形化采集工具☆23Apr 28, 2022Updated 3 years ago
- Client-Side Prototype Pollution Tools☆86Sep 21, 2021Updated 4 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- ☆105Jan 3, 2023Updated 3 years ago