PortSwigger / flowLinks
Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.
☆25Updated 3 years ago
Alternatives and similar repositories for flow
Users that are interested in flow are comparing it to the libraries listed below
Sorting:
- ☆43Updated 5 years ago
- miscellaneous security research stuff☆37Updated 6 years ago
- Full TTY reverse shell over SSH☆59Updated 5 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 7 years ago
- Burp extension☆58Updated 7 years ago
- Burp extension to passively scan for applications revealing software version numbers☆31Updated last year
- Study about HQL injection exploitation.☆51Updated 9 years ago
- YSOSERIAL Integration with burp suite☆41Updated 3 years ago
- A collection of scripts used to interact with the Burp Rest API☆55Updated 6 years ago
- Burp Suite Attack Selector Plugin☆60Updated 8 years ago
- XSS payloads for edge cases☆34Updated 7 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆47Updated 4 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Updated 5 years ago
- Burp Suite extension to passively scan for applications revealing server error messages☆64Updated 2 years ago
- ☆63Updated 6 years ago
- ☆103Updated 5 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Updated 6 years ago
- Environment for CVE-2019-6340 (Drupal)☆42Updated 2 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Updated 6 years ago
- CORS checking☆34Updated 7 years ago
- A simple Burp extension for scanning stuffs in CTF☆30Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆67Updated 5 years ago
- Essential tool for finding blind injection attacks.☆50Updated 6 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- ☆38Updated 5 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 9 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆100Updated 6 years ago
- OWASP Skanda - SSRF Exploitation Framework☆37Updated 12 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago