caido-community / workflowsLinks
🛠️ Workflows created by the community
☆85Updated this week
Alternatives and similar repositories for workflows
Users that are interested in workflows are comparing it to the libraries listed below
Sorting:
- Chrome extension for automating CSPT discovery☆123Updated 5 months ago
- EvenBetterExtensions allows you to quicky install and keep updated Caido extensions.☆23Updated last year
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆147Updated 8 months ago
- Finds graphql queries in javascript files☆65Updated last year
- ☆154Updated 2 years ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆160Updated last month
- ai-based domain name generation☆97Updated 10 months ago
- ☆64Updated 2 years ago
- Automatically look for paramater reflections in the HTTP response☆18Updated 7 months ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆80Updated 2 years ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆140Updated last year
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Updated 9 months ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆57Updated last year
- This Chromium extension scans the page for external iFrames, Scripts, and Styles, logs them to the console, and checks if their domains a…☆67Updated 11 months ago
- ☆87Updated last week
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆156Updated last year
- 🔰 Caido Plugin StarterKit☆34Updated last year
- ☆106Updated last year
- Identify virtual hosts by similarity comparison☆133Updated last year
- GQLSpection - parses GraphQL introspection schema and generates possible queries☆97Updated 9 months ago
- ☆42Updated last month
- Remote CLI tools at your fingertips☆99Updated last year
- ☆67Updated 3 years ago
- A tool to guess the rest of the shortnames provided by vulnerable IIS instances.☆42Updated 2 years ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources