PortSwigger / token-extractor
A Burp extension for generic extraction and reuse of data within HTTP requests and responses.
☆8Updated 3 years ago
Alternatives and similar repositories for token-extractor:
Users that are interested in token-extractor are comparing it to the libraries listed below
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 3 years ago
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆16Updated 3 months ago
- Ctf Writeups☆10Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Magento Security Scanner☆15Updated 3 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆12Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 9 months ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Static analysis of APKs with regular expressions☆10Updated 3 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Modular C2 server to tame your pack of wolves☆11Updated last year
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Various scripts & tools☆11Updated 10 months ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- Burp Extension to manipulate AES encrypted payloads☆14Updated 3 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆20Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago