PortSwigger / pentest-mapperLinks
A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities
☆119Updated 2 years ago
Alternatives and similar repositories for pentest-mapper
Users that are interested in pentest-mapper are comparing it to the libraries listed below
Sorting:
- Build your own reconnaissance system with Osmedeus Next Generation☆199Updated 4 months ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆118Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆120Updated 2 years ago
- ☆109Updated last year
- Check AWS S3 instances for read/write/delete access☆122Updated 3 years ago
- A projectdiscovery driven attack surface monitoring bot powered by axiom☆191Updated 3 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆170Updated 3 years ago
- Burpsuite plugin for Interact.sh☆228Updated last year
- Directory scans☆84Updated last year
- ☆159Updated 3 years ago
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆170Updated 2 years ago
- CVE Collection of jQuery UI XSS Payloads☆119Updated 2 years ago
- NotSoCereal: A Deserialization exploit playground☆54Updated 3 years ago
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆79Updated 2 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Updated 4 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆312Updated last year
- Apache Tomcat exploit and Pentesting guide for penetration tester☆63Updated 3 years ago
- ☆171Updated 2 months ago
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆245Updated 9 months ago
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your own☆75Updated last year
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago
- ☆73Updated 3 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆131Updated 3 years ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆61Updated 4 years ago
- Prototype Pollution Scanner☆129Updated 4 years ago
- A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.☆184Updated 4 years ago
- All Type of Payloads☆137Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆186Updated last year
- Wordlist to bruteforce for LFI☆128Updated 6 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆62Updated 6 months ago