andresriancho / burp-proxy-searchLinks
Burp suite HTTP history advanced search
☆11Updated 7 years ago
Alternatives and similar repositories for burp-proxy-search
Users that are interested in burp-proxy-search are comparing it to the libraries listed below
Sorting:
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116Updated 5 years ago
- Tool to help identify timing attacks☆70Updated 13 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Metasploit Framework☆26Updated 7 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆154Updated 10 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Random collection of exploit code, tools, scripts, etc.☆26Updated 10 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- A simple bash based metasploit automation tool!☆123Updated 2 years ago
- Passive Vulnerability Auditor☆132Updated 8 years ago
- Vulnerability scanner based on vulners.com audit API☆64Updated 6 years ago
- ☆51Updated 9 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆46Updated 3 years ago
- ☆82Updated last year
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Amazon S3 bucket spelunking!☆86Updated 7 years ago
- VOIP Security Audit Framework☆108Updated 7 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago