albinowax / albinowaxUtilsLinks
☆14Updated 2 months ago
Alternatives and similar repositories for albinowaxUtils
Users that are interested in albinowaxUtils are comparing it to the libraries listed below
Sorting:
- ☆64Updated 3 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 5 months ago
- ☆26Updated 2 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated last year
- An extension to use Semgrep inside Burp Suite.☆89Updated 3 months ago
- ☆38Updated 2 months ago
- ☆169Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Utility for creating ZipSlip archives☆74Updated 2 years ago
- ☆21Updated 3 months ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 7 months ago
- a deterministic finite automata ranker☆71Updated 3 years ago
- ☆22Updated 5 months ago
- ☆94Updated 3 years ago
- This repository contains all the examples related to a series of tutorials that demonstrate how to use the new Montoya API of Burp Suite …☆44Updated 9 months ago
- A black-box scanner for HTTP request smuggling vulnerabilities caused by chunk parsing discrepancies.☆18Updated last month
- ☆30Updated last year
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆98Updated last year
- ☆12Updated 3 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆28Updated 10 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆29Updated last year
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆60Updated 2 years ago
- an Evil Java RMI Registry.☆52Updated 2 years ago
- ☆56Updated 4 years ago
- A collection of my Semgrep rules☆49Updated 2 years ago
- Make better use of the embedded browser that comes by default with Burp☆44Updated last year
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Updated 7 years ago