Sprocket-Security / gigaproxyLinks
One proxy to rule them all
☆124Updated last year
Alternatives and similar repositories for gigaproxy
Users that are interested in gigaproxy are comparing it to the libraries listed below
Sorting:
- ☆141Updated last year
- This extension enhances Burp Suite by adding several UI and functional features, making it more user-friendly.☆70Updated 7 months ago
- ☆171Updated 2 months ago
- Everything and anything related to password spraying☆143Updated last year
- ☆87Updated last month
- ☆105Updated 2 years ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆203Updated 3 months ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆77Updated last year
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆136Updated 8 months ago
- ☆55Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆184Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆145Updated last year
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆45Updated 3 weeks ago
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆16Updated last year
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆72Updated 5 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆46Updated 4 months ago
- Get some useful data from Clouds for your targets☆20Updated 2 weeks ago
- Session Hijacking Visual Exploitation☆202Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆109Updated 2 months ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated last month
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆140Updated 2 years ago
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆61Updated 11 months ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆98Updated 2 years ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆14Updated 8 months ago
- Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)☆77Updated last year
- CVE-2025-24016: RCE in Wazuh server! Remote Code Execution☆1Updated 5 months ago
- ☆77Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year