PortSwigger / nuclei-burp-integrationLinks
Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.
☆29Updated 2 years ago
Alternatives and similar repositories for nuclei-burp-integration
Users that are interested in nuclei-burp-integration are comparing it to the libraries listed below
Sorting:
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- ☆37Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆59Updated 2 years ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆25Updated last year
- Bcheck scripts for Burp☆28Updated 10 months ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆59Updated 2 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆115Updated last year
- A Go tool that gets the newest PRs from projectdiscovery/nuclei-templates.☆55Updated 2 years ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆63Updated last year
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- Script for Bug Bounty☆29Updated 3 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆66Updated last year
- List all public repositories for (valid) GitHub usernames☆74Updated last year
- Fast and lightweight Web Application Firewall Fingerprinting tool☆62Updated 6 months ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆35Updated 10 months ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆44Updated last year
- Extract endpoints marked as disallow in robots files to generate wordlists.☆57Updated 3 years ago
- ☆55Updated 2 years ago
- Web CTF CheatSheet 🐈☆34Updated 6 years ago
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆32Updated last year
- vīlicus is a bug bounty api dashboard☆41Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 10 months ago
- Collection of ProjectDiscovery wallpapers☆31Updated last year
- ☆57Updated last year
- Resolvers updated daily for reconftw☆47Updated 2 years ago
- ☆36Updated last week
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago