andrei8055 / Burp-Automation-ResourcesLinks
Pentest automation resources for Burp
☆14Updated last year
Alternatives and similar repositories for Burp-Automation-Resources
Users that are interested in Burp-Automation-Resources are comparing it to the libraries listed below
Sorting:
- Custom scan profiles for use with Burp Suite Pro☆144Updated last year
- Private Nuclei Templates☆100Updated 4 months ago
- ☆108Updated 2 years ago
- Scripts and other stuff.☆132Updated last year
- This repository contains some of the most exhaustive wordlists for enumeration, gathered from a lot of wordlists available on the Interne…☆103Updated 9 months ago
- Automation of tokens/api keys testing.☆134Updated 2 years ago
- Learn how to automate XSS, SSRF, LFI, SQLI, NoSQLi☆42Updated 4 years ago
- ☆43Updated 6 months ago
- Save your dorking results to the terminal. A modified version of TomNomNom's amazing tool!☆90Updated 4 months ago
- Web Application Penetration Testing☆120Updated 2 months ago
- Describe how to use ffuf different options with examples☆89Updated 2 years ago
- JIRA"YA is a vulnerability analyzer for JIRA instances. It runs active scans to identify vulnerabilities by interacting with the host and…☆36Updated 10 months ago
- Here Are Some Bug Bounty Resource From Twitter☆99Updated last month
- ☆136Updated 3 years ago
- A Tool for Domain Flyovers☆113Updated 7 months ago
- ☆172Updated 5 months ago
- ☆161Updated 2 years ago
- unleashed ffuf☆217Updated last month
- ☆66Updated last month
- Remote CLI tools at your fingertips☆89Updated 11 months ago
- Recon MindMap (RMM)☆158Updated last year
- ☆136Updated 4 months ago
- A tool offering templates for streamlined bug bounty reporting☆58Updated last year
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆142Updated last year
- ☆103Updated last year
- Self-hosted passive subdomain continous monitoring tool.☆165Updated last year
- Nodesub is a command-line tool for finding subdomains in bug bounty programs☆148Updated 11 months ago
- Bug bounty domain manager with validation, exports & Redis storage ✨☆22Updated last month
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆67Updated 3 months ago
- A OWASP Based Checklist With 80+ Test Cases☆149Updated 2 years ago