Verizon / verizon_burp_extensions_aiView external linksLinks
Verizon Burp Extensions: AI Suite
☆142Apr 22, 2025Updated 9 months ago
Alternatives and similar repositories for verizon_burp_extensions_ai
Users that are interested in verizon_burp_extensions_ai are comparing it to the libraries listed below
Sorting:
- Java archive implant toolkit.☆61Apr 20, 2025Updated 9 months ago
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆115Feb 23, 2025Updated 11 months ago
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆26Mar 31, 2025Updated 10 months ago
- ☆17Jan 9, 2025Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148May 23, 2024Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Aug 5, 2024Updated last year
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆86Mar 12, 2025Updated 11 months ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆311May 16, 2024Updated last year
- ☆53Sep 23, 2025Updated 4 months ago
- ☆618Feb 5, 2026Updated last week
- A python3 script searching for secret on swaggerhub☆66Mar 22, 2022Updated 3 years ago
- ☆173Aug 9, 2025Updated 6 months ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Aug 11, 2023Updated 2 years ago
- ☆54Jan 21, 2025Updated last year
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- An Ansible collection that installs an SCCM deployment with optional configurations.☆101Dec 8, 2025Updated 2 months ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆20Feb 8, 2024Updated 2 years ago
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- ☆45Mar 5, 2025Updated 11 months ago
- ☆91Mar 17, 2025Updated 10 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Dec 12, 2023Updated 2 years ago
- ai-based domain name generation☆102Feb 3, 2025Updated last year
- Experiments with Google Gemini's Vision capabilities for LLM driven/aided web navigation and desktop manipulation☆32Jan 22, 2025Updated last year
- SCEP request tool for AD CS and Intune☆73Oct 24, 2025Updated 3 months ago
- ☆195Apr 23, 2025Updated 9 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Jul 22, 2025Updated 6 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆214Oct 19, 2024Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Apr 10, 2024Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆284May 16, 2025Updated 9 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166May 6, 2023Updated 2 years ago
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆180Sep 11, 2025Updated 5 months ago
- CT Log Scanner☆513Dec 26, 2025Updated last month
- Tool to fuzz for interesting vhost.☆23Jan 8, 2025Updated last year
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 3 years ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,290Jun 17, 2025Updated 7 months ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago