PortSwigger / atorLinks
☆30Updated last year
Alternatives and similar repositories for ator
Users that are interested in ator are comparing it to the libraries listed below
Sorting:
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- ☆36Updated 6 months ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- HTTP requests of FrontPage expolit☆25Updated 11 years ago
- Python script to launch burp scans automatically☆32Updated 4 years ago
- A simple tool which makes creating nuclei templates even easier.☆37Updated last year
- ☆16Updated 2 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆60Updated 2 years ago
- ☆94Updated 3 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 3 years ago
- Bcheck scripts for Burp☆29Updated 11 months ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- Tool to extract & validate google fcm server keys from apks☆29Updated 4 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 6 months ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 4 months ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Stay within program scope☆37Updated 2 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆45Updated last year
- ☆48Updated 4 years ago
- ☆27Updated 2 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆19Updated 5 years ago
- ☆26Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago