Trendyol / swagger-parser-burp-extensionLinks
☆44Updated 3 months ago
Alternatives and similar repositories for swagger-parser-burp-extension
Users that are interested in swagger-parser-burp-extension are comparing it to the libraries listed below
Sorting:
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆38Updated last year
- Log4j for nuclei☆68Updated 4 years ago
- ☆58Updated last year
- ☆10Updated last year
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆54Updated last year
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆25Updated 6 months ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Updated last month
- Striping CDN & WAF IPs from a list of IP Addresses☆80Updated 7 months ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆82Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Updated 11 months ago
- Github action for monitoring CVE☆43Updated this week
- ☆35Updated 3 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated 2 years ago
- Bcheck scripts for Burp☆28Updated last year
- 0x94TR Burp Extension - Java version☆31Updated 5 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Make better use of the embedded browser that comes by default with Burp☆44Updated last year
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Updated 3 years ago
- Some of the gf patterns which i use☆45Updated 3 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Updated 7 years ago
- CTF challenges WriteUp☆14Updated 3 years ago
- Extract JavaScript files from burp suite project with ease.☆97Updated 3 years ago
- ☆28Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- My talks...☆25Updated 10 months ago
- ☆95Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- A set of open-source community scripts☆65Updated last year