PortSwigger / co2
A collection of enhancements for Portswigger's popular Burp Suite web penetration testing tool.
☆23Updated 10 months ago
Alternatives and similar repositories for co2:
Users that are interested in co2 are comparing it to the libraries listed below
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆42Updated 2 years ago
- Add headers to all Burp requests to bypass some WAF products☆37Updated last year
- Collection of content discovery wordlists in one wordlist.☆37Updated 3 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆56Updated 2 years ago
- ☆76Updated 4 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆39Updated last year
- ☆47Updated 3 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- Security test tool for Blind XSS☆26Updated 4 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35Updated 7 months ago
- HTTP requests of FrontPage expolit☆24Updated 11 years ago
- CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE☆32Updated 4 years ago
- Custom scripts for directory fuzzing, subdomain enumeration, and more.☆43Updated 3 years ago
- Broken Link Hijacking Burp Extension☆56Updated 5 years ago
- A Web-UI for subdomain enumeration (subfinder)☆54Updated 4 years ago
- Finds Directory Listings or open S3 buckets from a list of URLs☆51Updated 3 years ago
- 10 Reset Password Flaws Based on Web Application Security☆11Updated 4 years ago
- NodeJS script to extract assets for the Apple bug bounty program from their security acknowledgments page for bug bounty recon.☆79Updated 2 years ago
- Messy BurpSuite plugin for SQL Truncation vulnerabilities.☆62Updated 4 years ago
- ☆56Updated 4 years ago
- A Payload Injector for bugbounties written in go☆70Updated 4 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 2 years ago
- It's an watcher for new scopes added to bounty-targets-data and send you alert to Slack.☆56Updated 2 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Updated 4 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 4 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆47Updated 2 years ago