andresriancho / burp-proxy-searchView external linksLinks
Burp suite HTTP history advanced search
☆10Mar 20, 2018Updated 7 years ago
Alternatives and similar repositories for burp-proxy-search
Users that are interested in burp-proxy-search are comparing it to the libraries listed below
Sorting:
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 5 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- Script to check Kali Linux configs☆25Jan 14, 2019Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Phraseanet dependency repository☆29Jun 12, 2017Updated 8 years ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆78Aug 4, 2025Updated 6 months ago
- Visualize Terraform plans without the Cloud. A lightweight web UI for S3-backed projects to turn CLI output into clear, readable diffs.☆13Apr 17, 2025Updated 9 months ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- My Lisk, Shift, Ark, Rise, Oxy, Kapu, Oxy redistribution software☆15Jul 27, 2021Updated 4 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- ☆14Dec 5, 2014Updated 11 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- A binary rainfall visualizer for packet captures. Idea taken from Greg Conti's "Security Data Visualization".☆13Nov 5, 2020Updated 5 years ago
- A static analysis framework for NASL.☆14Nov 30, 2022Updated 3 years ago
- WAyereless Site SUrveying Program☆12Feb 9, 2016Updated 10 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Minimal ZX Spectrum for Ulx3s ECP5 board☆12May 7, 2020Updated 5 years ago
- Puppet module for non-OSP VMware Tools Installation☆26Jan 27, 2020Updated 6 years ago
- KeePass v1 DB tool☆29Apr 6, 2013Updated 12 years ago
- Mini CA☆12Sep 7, 2015Updated 10 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Simple bash script to enumerate Linux machines☆13Nov 5, 2018Updated 7 years ago
- This is a list of scripts I created while formerly working at Drexel University. These scripts were released with permission.☆16Oct 18, 2020Updated 5 years ago
- Credit Card Number Generator Workflow for Alfred 2☆19Jul 21, 2013Updated 12 years ago
- Crack Facebook Public Friend and Follower List. Login With Token / Cookie / User - Pass.☆10Feb 26, 2022Updated 3 years ago
- Web interface, SiriProxy plugin and Perl libraries for Heatmiser Wi-Fi Thermostats☆11May 29, 2021Updated 4 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 6 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- Scans a system for potential credit cards for PCI DSS compliance☆16Oct 30, 2016Updated 9 years ago
- Export OTP configurations from FreeOTP☆13Mar 10, 2017Updated 8 years ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆11Feb 10, 2013Updated 13 years ago
- Osmocom-BB fully automatic compilation script(Osmocom-BB 全自动编译脚本支持arm amrhf i386 amd64 aarch64)☆11Apr 20, 2019Updated 6 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- find all "blackhole" directories with a huge amount of filesystem entries in a flat structure☆17Sep 20, 2022Updated 3 years ago
- ☆13Sep 8, 2024Updated last year