aress31 / google-authenticator
Burp Suite plugin that dynamically generates Google 2FA codes for use in session handling rules (approved by PortSwigger for inclusion in their official BApp Store).
☆28Updated 2 years ago
Alternatives and similar repositories for google-authenticator:
Users that are interested in google-authenticator are comparing it to the libraries listed below
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆16Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzing☆22Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Wordlist generator☆15Updated 4 years ago
- Tool to automatically email results from your Python scripts to your inbox as text or as a file attachment, storing the sender email acco…☆7Updated 5 years ago
- Automated Recon Framework☆24Updated 4 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆43Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated 3 weeks ago
- Advanced Recon Tool☆26Updated 4 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- A python library to automate time-based blind SQL injection☆51Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- XSS scanning with Dalfox on Github-action☆23Updated last year
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Exploits for some of the vulnerabilities I have discovered☆18Updated 4 years ago
- ☆28Updated 2 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Updated 9 years ago
- ☆10Updated 3 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Updated 3 months ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago