PortSwigger / nuclei-burp-integrationLinks
Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.
☆30Updated 2 years ago
Alternatives and similar repositories for nuclei-burp-integration
Users that are interested in nuclei-burp-integration are comparing it to the libraries listed below
Sorting:
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti …☆117Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated 2 years ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆60Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- ☆27Updated 2 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆67Updated last year
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆108Updated 2 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- ☆40Updated 2 months ago
- Bcheck scripts for Burp☆28Updated last year
- A python3 script searching for secret on swaggerhub☆68Updated 3 years ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆64Updated 8 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated 11 months ago
- NotSoCereal: A Deserialization exploit playground☆53Updated 3 years ago
- Security Advisories☆34Updated 2 months ago
- ☆106Updated 2 years ago
- ☆30Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- Repository of CVE found by OCD people☆79Updated 2 months ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆60Updated 2 years ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆55Updated 10 months ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 7 months ago
- ☆26Updated 3 years ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆25Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago