albinowax / albinowaxUtilsLinks
☆15Updated last week
Alternatives and similar repositories for albinowaxUtils
Users that are interested in albinowaxUtils are comparing it to the libraries listed below
Sorting:
- ☆64Updated 3 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated last month
- ☆27Updated 2 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆34Updated 9 months ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- ☆41Updated 3 weeks ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 6 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Burp extension to generate multi-step CSRF POC.☆31Updated 6 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆100Updated 3 months ago
- ☆169Updated 4 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 10 months ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36Updated 3 years ago
- ☆95Updated 4 years ago
- Query various sources for CVE proof-of-concepts☆52Updated 2 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- ☆21Updated 2 months ago
- The following package is the standalone wordlist-only component to flask-unsign.☆43Updated last year
- A black-box scanner for HTTP request smuggling vulnerabilities caused by chunk parsing discrepancies.☆23Updated last month
- Utility for creating ZipSlip archives☆79Updated 2 years ago
- This repository contains all the examples related to a series of tutorials that demonstrate how to use the new Montoya API of Burp Suite …☆44Updated last year
- ☆32Updated last year
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- ☆25Updated 8 months ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- ☆36Updated 10 months ago
- ☆56Updated 4 years ago
- a deterministic finite automata ranker☆72Updated 3 years ago
- ☆12Updated 3 years ago