PortSwigger / distribute-damageView external linksLinks
Evenly distributes scanner load across targets
☆92Apr 11, 2025Updated 10 months ago
Alternatives and similar repositories for distribute-damage
Users that are interested in distribute-damage are comparing it to the libraries listed below
Sorting:
- A Burp Suite extension that checks for the HTTPoxy vulnerability.☆96Aug 25, 2021Updated 4 years ago
- Finds unknown classes of injection vulnerabilities☆708Apr 30, 2025Updated 9 months ago
- ☆13Feb 18, 2022Updated 3 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- A tool for monitoring bug bounty programs across multiple platforms to track scope changes.☆32Jan 25, 2026Updated 2 weeks ago
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- ☆95Sep 18, 2021Updated 4 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Process URLs and remove duplicate query parameters.☆28Mar 19, 2024Updated last year
- ☆18Apr 7, 2022Updated 3 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Terraform script to deploy AD-based environment on Azure☆41Apr 22, 2023Updated 2 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 8 years ago
- ☆148Feb 17, 2022Updated 3 years ago
- Tool for making it easy to collect dns results from the CLI☆40Aug 14, 2024Updated last year
- A Burp Suite Pro extension which augments your proxy traffic by injecting non-invasive headers designed to reveal backend systems by caus…☆441Apr 11, 2025Updated 10 months ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Unofficial documentation for the great tool Param Miner☆184Aug 21, 2022Updated 3 years ago
- Burp Suite Extension - Trigger actions and reshape HTTP request/response and WebSocket traffic using configurable rules☆107Nov 16, 2025Updated 2 months ago
- Provides an overview of the inner file structure of a PDF☆25Sep 26, 2022Updated 3 years ago
- Golang command line tool for the macOS Endpoint Security Framework☆29Nov 25, 2019Updated 6 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 6 years ago
- ☆24Jan 31, 2016Updated 10 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆357Oct 14, 2020Updated 5 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Nov 4, 2014Updated 11 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Sep 13, 2018Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago