Static-Flow / BurpRequestCleaner
This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.
☆12Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for BurpRequestCleaner
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- A BurpSuite plugin for BBRF☆24Updated this week
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆12Updated 4 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Updated 3 years ago
- Tool to find stored robots.txt files from the past☆16Updated last year
- Ffuf output browser☆37Updated last year
- Gampung tools for find nuclei template from github☆10Updated last year
- View screenshots as a slideshow over http☆15Updated 4 years ago
- ☆12Updated 3 years ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Validate proxies for specific domain☆34Updated 3 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Updated 3 years ago
- Take a list of URIs and print all the of the paths☆10Updated 4 years ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆18Updated 3 years ago
- Takes a list of domains as the input, checks if they have a security.txt, outputs the results.☆13Updated 4 years ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Updated 4 years ago
- Extract subdomains from rapiddns.io☆23Updated last year
- ☆9Updated 3 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzing☆21Updated 4 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 2 years ago
- ☆10Updated 5 years ago
- Creating a Database for Mass Recon☆12Updated 3 years ago
- Secrets detection based on regular expressions.☆22Updated last year
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆14Updated last year
- Pythonize Intruder Payload☆13Updated 3 years ago