chopicalqui / TurboDataMinerLinks
The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of information from the Burp Suite project as well as the flexible and dynamic on-the-fly modification of outgoing or incoming HTTP requests using Python scripts. Thus, Turbo Data Miner shall aid in gaining a better and fas…
☆60Updated 2 years ago
Alternatives and similar repositories for TurboDataMiner
Users that are interested in TurboDataMiner are comparing it to the libraries listed below
Sorting:
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- Advanced Recon Tool☆26Updated 5 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- ☆48Updated 4 years ago
- Bucket Flaws ( S3 Bucket Mass Scanner ): A Simple Lightweight Script to Check for Common S3 Bucket Misconfigurations☆58Updated 5 years ago
- Host Header Injection Scanner☆48Updated 5 years ago
- Messy BurpSuite plugin for SQL Truncation vulnerabilities.☆63Updated 5 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 5 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 10 months ago
- ☆36Updated 10 months ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Updated 4 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Updated 4 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆27Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Updated 10 months ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆33Updated 5 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 5 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆75Updated 5 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- bug bounty automation☆13Updated 4 years ago
- All known and unknown public POC's for wordpress themes and plugins☆78Updated 4 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 3 years ago
- ☆59Updated 4 years ago
- Tool to automate recon☆43Updated 3 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated last year
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- Related subdomains finder☆30Updated 3 years ago
- Return domains in CSP headers in http response☆16Updated 4 years ago