bytebutcher / burp-send-toView external linksLinks
Adds a customizable "Send to..."-context-menu to your BurpSuite.
☆163Nov 27, 2022Updated 3 years ago
Alternatives and similar repositories for burp-send-to
Users that are interested in burp-send-to are comparing it to the libraries listed below
Sorting:
- Custom scripts for the PIPER Burp extensions.☆98Sep 24, 2023Updated 2 years ago
- ☆695Jul 4, 2022Updated 3 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆79Dec 29, 2019Updated 6 years ago
- Because just a dark theme wasn't enough!☆587Dec 17, 2024Updated last year
- A Burp Extension that makes it easier to view all script code on a Response.☆17Nov 12, 2023Updated 2 years ago
- Piper Burp Suite Extender plugin☆129Jan 14, 2026Updated last month
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Mar 5, 2021Updated 4 years ago
- Urls de-duplication tool for better recon.☆145May 29, 2025Updated 8 months ago
- Burp Extension for easily creating Wordlists☆215Oct 5, 2021Updated 4 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆560Mar 8, 2025Updated 11 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,771Apr 26, 2024Updated last year
- Fetch web pages using headless Chrome, storing all fetched resources including JavaScript files. Run arbitrary JavaScript on many web pag…☆530Apr 23, 2025Updated 9 months ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs☆95Jan 21, 2021Updated 5 years ago
- ☆59Apr 8, 2021Updated 4 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,496Jan 8, 2026Updated last month
- List HackerOne private program assets☆154Jun 24, 2021Updated 4 years ago
- A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.☆309Jul 9, 2024Updated last year
- Burp extension to create target specific and tailored wordlist from burp history.☆255Dec 8, 2021Updated 4 years ago
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆265Feb 5, 2026Updated last week
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,285Aug 7, 2024Updated last year
- Horizontal Domain Discovery☆77May 22, 2023Updated 2 years ago
- You can read the writeup on this script here☆192Sep 30, 2021Updated 4 years ago
- Turbo Intruder Scripts☆228Jun 11, 2020Updated 5 years ago
- DNS and Target HTTP History Local Storage and Search☆63Feb 14, 2021Updated 4 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆261Oct 16, 2022Updated 3 years ago
- ☆13Feb 18, 2022Updated 3 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- SSRF plugin for burp Automates SSRF Detection in all of the Request☆610Jan 20, 2021Updated 5 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,042Aug 14, 2024Updated last year
- A tool for testing subdomain takeover possibilities at a mass scale.☆50May 23, 2021Updated 4 years ago
- A tool for append URLs, skipping duplicates/paths & combine parameters.☆128Mar 2, 2022Updated 3 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,059Jan 2, 2024Updated 2 years ago
- ☆95Sep 18, 2021Updated 4 years ago
- ☆36Jan 22, 2025Updated last year
- Client Side Prototype Pollution Scanner☆524Sep 17, 2022Updated 3 years ago
- Burp Suite Extension to monitor new scope☆200Mar 31, 2021Updated 4 years ago
- ☆375Aug 20, 2021Updated 4 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆658Feb 1, 2025Updated last year