PortSwigger / nuclei-burp-integrationLinks
Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.
☆30Updated 2 years ago
Alternatives and similar repositories for nuclei-burp-integration
Users that are interested in nuclei-burp-integration are comparing it to the libraries listed below
Sorting:
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last month
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- ☆32Updated last year
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆61Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- ☆106Updated 2 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆118Updated 2 years ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆25Updated 2 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated last year
- ☆27Updated 2 years ago
- ☆41Updated 3 weeks ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- ☆27Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆100Updated 3 months ago
- Cloud Exploit Framework☆114Updated 3 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Updated 3 weeks ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆64Updated 11 months ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration☆45Updated 8 months ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆54Updated last year
- ☆57Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Repository of CVE found by OCD people☆83Updated 5 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 3 years ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆82Updated last year
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago