Sprocket-Security / gigaproxy
One proxy to rule them all
☆119Updated 8 months ago
Alternatives and similar repositories for gigaproxy:
Users that are interested in gigaproxy are comparing it to the libraries listed below
- ☆139Updated 11 months ago
- This extension enhances Burp Suite by adding several UI and functional features, making it more user-friendly.☆67Updated 3 months ago
- A BurpSuite extension to create a custom word-list of endpoint and parameters for enumeration and fuzzing☆140Updated last year
- A vulnerable RESTful application written in Node and React based on OWASP API security top 10 2023 edition.☆51Updated last year
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆115Updated 4 months ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆13Updated 4 months ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆87Updated 6 months ago
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆96Updated 7 months ago
- Get some useful data from Clouds for your targets☆20Updated this week
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆75Updated last year
- A better way of querying certificate transparency logs☆84Updated last week
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆44Updated last year
- A powerful JavaScript monitoring tool for bug bounty hunters. Track changes in JavaScript files across websites, detect new attack surfac…☆69Updated last month
- ☆166Updated 7 months ago
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆80Updated 4 months ago
- Simple django rce exploitation with leaked SECRET_KEY variable☆51Updated 2 years ago
- dEX is a powerful tool for transmitting OS command output over DNS. It is equipped with robust mechanisms for handling missing chunks, en…☆14Updated 4 months ago
- Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite☆77Updated 2 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Updated 6 months ago
- unleashed ffuf☆111Updated 9 months ago
- Self-hosted passive subdomain continous monitoring tool.☆160Updated last year
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆87Updated this week
- ReconMaster contest - scripts used and a write-up☆87Updated 3 years ago
- Monitoring the Cloud Landscape☆79Updated last week
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated last year
- Striping CDN IPs from a list of IP Addresses☆75Updated 2 years ago
- Exploits targeting vBulletin.☆76Updated last year
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆117Updated last year
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆41Updated 5 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆38Updated last year