Sprocket-Security / gigaproxy
One proxy to rule them all
☆120Updated 9 months ago
Alternatives and similar repositories for gigaproxy:
Users that are interested in gigaproxy are comparing it to the libraries listed below
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆96Updated 8 months ago
- This extension enhances Burp Suite by adding several UI and functional features, making it more user-friendly.☆69Updated 4 months ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆75Updated last year
- ☆104Updated 2 years ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆131Updated 5 months ago
- ☆139Updated last year
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆139Updated last year
- A vulnerable RESTful application written in Node and React based on OWASP API security top 10 2023 edition.☆53Updated last year
- Get some useful data from Clouds for your targets☆19Updated this week
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆90Updated last year
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆23Updated last month
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- ☆215Updated last year
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆13Updated 5 months ago
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆92Updated last month
- Everything and anything related to password spraying☆134Updated 11 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 7 months ago
- A better way of querying certificate transparency logs☆86Updated last month
- Authentication Bypass in GoAnywhere MFT☆61Updated last year
- Our Tips&Tricks☆117Updated 2 months ago
- Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)☆75Updated 11 months ago
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆89Updated 2 months ago
- A powerful JavaScript monitoring tool for bug bounty hunters. Track changes in JavaScript files across websites, detect new attack surfac…☆74Updated 2 weeks ago
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆27Updated last week
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆179Updated 3 weeks ago
- ☆158Updated last year
- A comprehensive list of custom filters for Logger++ to identify various vulnerabilities in different API styles☆224Updated 6 months ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆54Updated 3 months ago
- Simple django rce exploitation with leaked SECRET_KEY variable☆52Updated 2 years ago
- Raven is a powerful and customizable web crawler written in Go.☆41Updated 8 months ago