codewatchorg / Burp-UserAgentLinks
Automatically modify the User-Agent header in all Burp requests
☆58Updated 7 years ago
Alternatives and similar repositories for Burp-UserAgent
Users that are interested in Burp-UserAgent are comparing it to the libraries listed below
Sorting:
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆157Updated 2 months ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆54Updated 3 years ago
- Burp Bounty profiles☆83Updated 3 years ago
- ☆64Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- Misc bounty and vulndisc things☆86Updated 4 years ago
- ☆60Updated last year
- A Web-UI for subdomain enumeration (subfinder)☆54Updated 5 years ago
- ☆83Updated last year
- ☆20Updated 5 years ago
- Workshop given at Hack in Paris 2019☆124Updated 2 years ago
- ☆44Updated 5 years ago
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆136Updated 5 years ago
- A XSS mind map ;)☆56Updated 9 years ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆110Updated 3 years ago
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆103Updated 5 years ago
- Add headers to all Burp requests to bypass some WAF products☆42Updated last year
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- A XSS Payload in a gif file☆45Updated 8 years ago
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆91Updated 6 years ago
- A collection of scripts to extend Burp Suite☆142Updated 6 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆45Updated last year
- Practice hacking JWT tokens☆115Updated 3 years ago
- SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibil…☆155Updated 5 years ago
- ☆76Updated 4 years ago
- ☆60Updated 6 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆113Updated 3 years ago
- Wordlist to bruteforce for LFI☆125Updated 5 years ago