crashbrz / BETLinks
Burp Enterprise Toolkit
☆12Updated 3 years ago
Alternatives and similar repositories for BET
Users that are interested in BET are comparing it to the libraries listed below
Sorting:
- ☆24Updated 4 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆29Updated 7 months ago
- ☆60Updated 2 years ago
- Check whether an IP address or hostname belongs to popular cloud providers☆70Updated this week
- Scan DockerHub images that match a keyword to find secrets.☆60Updated 4 years ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆14Updated last year
- 📚A curated list of product security resources.☆21Updated 4 months ago
- Do bulk whois lookups and get alerted on domains of interest.☆43Updated last year
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated this week
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆53Updated last year
- An example of a mis-configured Rails application release under MIT license.☆20Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- ☆90Updated 3 years ago
- multiple password 'asher using Python’s hashlib☆15Updated 4 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- Create subdomains and files wordlists from your browser history☆13Updated 2 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Open a DNS server that knows no records but records every request. Used for DNS exfiltration.☆69Updated 3 years ago
- Jumpstart multiple WebSocket servers quickly☆32Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Updated 3 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- ☆38Updated 4 years ago