JSON Beautifier for Burp written in Java
☆42Nov 20, 2019Updated 6 years ago
Alternatives and similar repositories for JSONBeautifier
Users that are interested in JSONBeautifier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp Suite JSON/JS-Beautifier☆14Sep 17, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/burp-extensions☆10Feb 18, 2020Updated 6 years ago
- JSON Beautifier for Burp written in Java☆41Mar 27, 2020Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Drupal 7.x Services Module Remote Code Execution Exploit - https://www.ambionics.io/blog/drupal-services-module-rce☆14Mar 9, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Zabbix Jsrpc.php Injection Exploit☆25Aug 29, 2016Updated 9 years ago
- SolarWinds Orion API 远程代码执行漏洞批量检测脚本☆10Jan 5, 2021Updated 5 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Feb 1, 2017Updated 9 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- 强制认证扫描与利用☆12Jul 21, 2023Updated 2 years ago
- ☆11Mar 18, 2021Updated 5 years ago
- Burp extension to perform Java Deserialization Attacks☆218Feb 2, 2024Updated 2 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 13 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 8 years ago
- ☆17Oct 4, 2020Updated 5 years ago
- ☆12Jul 23, 2021Updated 4 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- 某免杀webshell☆18Oct 10, 2023Updated 2 years ago
- 使用JS监听获取dz密码☆12Sep 5, 2017Updated 8 years ago
- 2018 Advent Calendar browser pwnables☆14Feb 14, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆19Mar 2, 2022Updated 4 years ago
- 利用api来查询用户的star,仓库的commits、releases、issus。查询关键字更新☆12Mar 7, 2021Updated 5 years ago
- 支持注入内存马和Bypass WAF☆29Dec 12, 2023Updated 2 years ago
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- Go package for nmap network scanning tool☆18Jun 7, 2023Updated 2 years ago
- burp-http请求转发至其他模块的插件☆74Sep 13, 2020Updated 5 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- 反编译微信小程序, 支持分包☆20Jun 21, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Scripts that can generate gopher payload.☆13Jun 26, 2020Updated 5 years ago
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆934Jun 22, 2020Updated 5 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆143Sep 29, 2021Updated 4 years ago
- Bypass cobaltstrike beacon config scan☆85May 24, 2021Updated 4 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago