BOR - Break On Request, is a burp extension that provides a custom context menu for marking requests to be stopped by the interceptor with only one click!
☆13Nov 18, 2022Updated 3 years ago
Alternatives and similar repositories for BOR
Users that are interested in BOR are comparing it to the libraries listed below
Sorting:
- CLI tool for filtering URLs/IPs with automatically-updated Bug Bounty program scope rules.☆35Dec 31, 2025Updated 2 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- Extract most frequent words in a list of subdomains☆13Feb 15, 2025Updated last year
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- This extension provides a central location for viewing all GraphQL requests/responses within a Burp project. It provides a clean UI that …☆15Feb 24, 2022Updated 4 years ago
- Example Docker Container for Deep Dream that runs in CLI mode☆10Aug 13, 2016Updated 9 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆12Sep 19, 2023Updated 2 years ago
- A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.☆15Sep 19, 2023Updated 2 years ago
- Android Clean Architecture Framework☆10Nov 28, 2016Updated 9 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- ☆65Dec 9, 2021Updated 4 years ago
- Samples for the CLI extensibility hackathon for MVP Summit 2016 in Redmond!☆14Feb 5, 2017Updated 9 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- A tool to migrate Burpsuite HTTP history to Caido☆35Apr 25, 2025Updated 10 months ago
- Jenkins plugin for pushing Sonar build statuses on a Slack channel.☆12May 18, 2018Updated 7 years ago
- FOUNDERS x SAMSUNG Blockchain Hackathon☆10Feb 4, 2026Updated last month
- RfCat - swiss-army knife of ISM band radio☆25Feb 9, 2022Updated 4 years ago
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆21Apr 19, 2024Updated last year
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- A python Flask app that generates dynamic DTDs for easy out-of-band data exfiltration.☆29Nov 2, 2022Updated 3 years ago
- Visually explore your JMH benchmarks on Jenkins!☆14Aug 6, 2024Updated last year
- Run this one line of code to make your fresh Kali install a little more awesome☆19Aug 12, 2025Updated 7 months ago
- 文件上传,图片上传(后缀名验证,文件类型验证),大文件分片上传,“秒传”,断点续传,传输失败自动重试,手动重试☆10Apr 14, 2018Updated 7 years ago
- ☆13Mar 3, 2023Updated 3 years ago
- WILSON Cloud Respwnder is a Web Interaction Logger Sending Out Notifications with the ability to serve custom content in order to appropr…☆50Feb 27, 2026Updated 2 weeks ago
- 轻量级、高性能的Java Web开发框架~☆20Feb 22, 2023Updated 3 years ago
- ☆14Dec 13, 2021Updated 4 years ago
- Will share some interesting writeups here :)