PortSwigger / atorLinks
☆33Updated last year
Alternatives and similar repositories for ator
Users that are interested in ator are comparing it to the libraries listed below
Sorting:
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- ☆29Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36Updated 3 years ago
- ☆36Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- ☆27Updated 2 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 4 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆32Updated 4 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- ☆42Updated 2 months ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Updated 2 years ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆61Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆44Updated 3 years ago
- Bcheck scripts for Burp☆28Updated last year
- A "Spring4Shell" vulnerability scanner.☆49Updated last year
- Stay within program scope☆37Updated 3 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated last year
- Most common AWS S3 bucket names.☆28Updated 5 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated 2 years ago
- Python script to launch burp scans automatically☆33Updated 4 years ago
- ☆95Updated 4 years ago
- an Evil Java RMI Registry.☆51Updated 3 years ago
- HTTP requests of FrontPage expolit☆26Updated 12 years ago
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Updated 4 years ago