Verizon Burp Extensions: AI Suite
☆142Apr 22, 2025Updated last year
Alternatives and similar repositories for verizon_burp_extensions_ai
Users that are interested in verizon_burp_extensions_ai are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extension functionality for the NightHawk operator client☆27Oct 31, 2023Updated 2 years ago
- Java archive implant toolkit.☆61Apr 20, 2025Updated last year
- ☆52Mar 30, 2026Updated last month
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- A red teaming attack paradigm against AI Agents☆33Mar 9, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆16Jan 9, 2025Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆150May 23, 2024Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆314May 16, 2024Updated last year
- ☆628Feb 5, 2026Updated 3 months ago
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆123Feb 23, 2025Updated last year
- Experiments with Google Gemini's Vision capabilities for LLM driven/aided web navigation and desktop manipulation☆30Jan 22, 2025Updated last year
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- ☆196Apr 23, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆98Mar 12, 2025Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- ☆45Mar 5, 2025Updated last year
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆51Jun 16, 2025Updated 10 months ago
- ☆92Mar 17, 2025Updated last year
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 6 months ago
- ai-based domain name generation☆140Feb 3, 2025Updated last year
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆63Apr 29, 2026Updated last week
- ☆172Aug 9, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Better version of SharpPick☆14Aug 29, 2025Updated 8 months ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,322Mar 27, 2026Updated last month
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Mar 2, 2025Updated last year
- Repo hacks☆21Dec 7, 2025Updated 5 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆169May 6, 2023Updated 3 years ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆23Nov 24, 2025Updated 5 months ago
- Abusing Azure services over C2☆370Jan 20, 2026Updated 3 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆132Apr 23, 2026Updated 2 weeks ago
- SCEP request tool for AD CS and Intune☆76Oct 24, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆400Jan 23, 2025Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆58Aug 11, 2023Updated 2 years ago
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 6 months ago
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆30Mar 31, 2025Updated last year
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆135Jul 22, 2025Updated 9 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year