MrTurvey / Burp2APILinks
Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.
☆70Updated 11 months ago
Alternatives and similar repositories for Burp2API
Users that are interested in Burp2API are comparing it to the libraries listed below
Sorting:
- A tool for quickly evaluating IAM permissions in AWS.☆59Updated last year
- ☆54Updated 9 months ago
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- ☆54Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆96Updated 2 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 3 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆147Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 7 months ago
- Vast.ai Password Kracking☆87Updated last week
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Next generation fireprox AWS API endpoint creation utility.☆53Updated 2 years ago
- A public, open source physical security methodology☆46Updated last year
- A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆156Updated 10 months ago
- ☆96Updated last week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 8 months ago
- A community-driven collection of BloodHound queries☆153Updated 2 weeks ago
- C2 Automation using Linode☆85Updated 3 years ago
- IPSpinner works as a local proxy that redirects requests through external services.☆103Updated 7 months ago
- Cloud subdomains identification tool☆61Updated 6 months ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- A Red Team Activity Hub☆224Updated last month
- Verizon Burp Extensions: AI Suite☆141Updated 6 months ago
- Everything and anything related to password spraying☆148Updated last year
- https://lolad-project.github.io/☆81Updated 10 months ago
- Artifact monitoring that ensures fairplay☆78Updated 9 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- ☆114Updated 5 months ago