Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.
☆30Jun 22, 2023Updated 2 years ago
Alternatives and similar repositories for nuclei-burp-integration
Users that are interested in nuclei-burp-integration are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆119Nov 23, 2023Updated 2 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated last year
- ☆121May 8, 2024Updated 2 years ago
- This extension provides a way to discover NoSQL injection vulnerabilities.☆10Feb 1, 2021Updated 5 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42May 9, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- BusPwn V1.0 is a powerful Modbus hacking framework designed for testing and exploiting vulnerabilities in Modbus-based systems commonly f…☆27Apr 19, 2025Updated last year
- OSED course preparation materials.☆16May 27, 2021Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆268Mar 4, 2023Updated 3 years ago
- Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.☆75Feb 25, 2022Updated 4 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Aug 14, 2025Updated 8 months ago
- WARNING: This is a vulnerable application to test the exploit for the Spring Break vulnerability (CVE-2017-8046). Run it at your own risk…☆14Oct 8, 2018Updated 7 years ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automatic Bug finder with buprsuite☆166Mar 6, 2023Updated 3 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- KERnano: The No-install Python Pen Testing kit. (Windows & Linux)☆13Sep 2, 2022Updated 3 years ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆43Apr 1, 2026Updated last month
- ☆34Sep 21, 2024Updated last year
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- A nginx container containing rtmp module and hdw-player for visualizing the stream.☆13Mar 1, 2026Updated 2 months ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Community Eventing and Scripting examples☆19Aug 11, 2025Updated 8 months ago
- Introduction to CYS4-SensitiveDiscoverer, a Burp extension that discovers sensitive information inside HTTP messages.☆23Nov 26, 2024Updated last year
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆18Jun 9, 2023Updated 2 years ago
- An example AzuraCast plugin, demonstrating the capabilities and common use-cases of the plugin system.☆15Dec 19, 2023Updated 2 years ago
- Automated Subnet Scanner☆26Feb 25, 2025Updated last year
- Blog☆10Jul 18, 2023Updated 2 years ago
- SAIST - Static AI-powered Scanning Tool! Scan literally anything with ✨ AI ✨☆33Apr 20, 2026Updated 2 weeks ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆20Jan 12, 2022Updated 4 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 4 years ago
- Reverse engineering UI for Frida and Android☆16Oct 10, 2023Updated 2 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- Your bloodhound for hidden info in those JS files.☆17May 13, 2024Updated last year
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Feb 16, 2022Updated 4 years ago
- A simple Node.js Express REST app with some OWASP vulnerabilities.☆22Aug 13, 2024Updated last year