Sprocket-Security / gigaproxyLinks
One proxy to rule them all
☆121Updated 11 months ago
Alternatives and similar repositories for gigaproxy
Users that are interested in gigaproxy are comparing it to the libraries listed below
Sorting:
- This extension enhances Burp Suite by adding several UI and functional features, making it more user-friendly.☆70Updated 7 months ago
- ☆140Updated last year
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆71Updated 4 months ago
- ☆105Updated 2 years ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆97Updated 9 months ago
- Everything and anything related to password spraying☆142Updated last year
- ☆171Updated last month
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆202Updated 3 months ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆135Updated 7 months ago
- ☆76Updated last year
- A better way of querying certificate transparency logs☆87Updated 3 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- Juniper Firewalls CVE-2023-36845 - RCE☆52Updated last year
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆13Updated 7 months ago
- Get some useful data from Clouds for your targets☆20Updated last week
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆90Updated last year
- A cheat sheet that contains common enumeration and attack methods for Mail Server.☆36Updated 2 years ago
- CVE-2023-22515: Confluence Broken Access Control Exploit☆136Updated last year
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆77Updated last year
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆24Updated 3 months ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆140Updated 2 years ago
- Authentication Bypass in GoAnywhere MFT☆62Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆182Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆41Updated 3 months ago
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆126Updated last year
- CVE-2025-24016: RCE in Wazuh server! Remote Code Execution☆54Updated 4 months ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆98Updated 10 months ago
- A vulnerable RESTful application written in Node and React based on OWASP API security top 10 2023 edition.☆54Updated last year
- Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)☆77Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆104Updated last month