aur3lius-dev / SpyDirLinks
BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration
☆23Updated 7 years ago
Alternatives and similar repositories for SpyDir
Users that are interested in SpyDir are comparing it to the libraries listed below
Sorting:
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- ☆32Updated 9 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- PHDAYS |||☆17Updated 12 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- BurpJDSer-ng☆28Updated this week
- BurpSuite Pro Python Extension☆18Updated 11 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- ☆46Updated 7 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Advanced XPath Injection Tool☆34Updated 10 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆14Updated 2 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Files from Zeronights presentation.☆28Updated 12 years ago