JonCooperWorks / burp-filefuzzer
☆33Updated 3 years ago
Alternatives and similar repositories for burp-filefuzzer
Users that are interested in burp-filefuzzer are comparing it to the libraries listed below
Sorting:
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆59Updated last year
- Spring4Shell Burp Scanner☆71Updated 3 years ago
- ☆55Updated 2 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆44Updated 11 months ago
- Web cache poisoning vulnerability scanner.☆66Updated 3 years ago
- ☆56Updated last year
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 3 years ago
- ☆42Updated 3 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆119Updated last year
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Updated 3 years ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆63Updated last year
- PoC for XSS in org.webjars:swagger-ui [3.14.2, 3.36.2]☆52Updated 2 years ago
- An MS Sharepoint and Frontpage Auditing Tool☆49Updated 6 months ago
- IIS shortname scanner + bruteforce☆52Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆44Updated 2 years ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆54Updated 6 months ago
- BurpSuite extension to convert requests into bcheck scripts☆31Updated last year
- Striping CDN & WAF IPs from a list of IP Addresses☆77Updated last week
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆24Updated last year
- ElasticSearch exploit and Pentesting guide for penetration tester☆27Updated 2 years ago
- Script for Bug Bounty☆28Updated 3 years ago
- Some contributions in the nuclei-templates repository☆58Updated 2 years ago
- Some of the gf patterns which i use☆43Updated 3 years ago
- ☆25Updated 2 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆57Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- HTTP verb tampering & methods enumeration☆58Updated 3 years ago
- Supertruder but better☆32Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago