Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the module provided and finally generate a HTML report.
☆123Apr 4, 2018Updated 7 years ago
Alternatives and similar repositories for burpy
Users that are interested in burpy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Project "Flashbang" - An open-source Flash-security helper☆205Apr 19, 2015Updated 10 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆168Feb 29, 2016Updated 10 years ago
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆1,143Mar 21, 2026Updated last week
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- ☆182Nov 14, 2013Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Aug 14, 2023Updated 2 years ago
- Setup script for Regon-ng☆939Nov 17, 2020Updated 5 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Feb 13, 2017Updated 9 years ago
- ☆478Jan 29, 2021Updated 5 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆260Aug 22, 2021Updated 4 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- ☆20Dec 29, 2015Updated 10 years ago
- Cloudflare DNS Enumeration Tool for Pentesters☆523Aug 6, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The Bug Hunters Methodology☆4,268Aug 1, 2023Updated 2 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227May 8, 2018Updated 7 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- ☆834Nov 13, 2023Updated 2 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Finds unknown classes of injection vulnerabilities☆709Apr 30, 2025Updated 11 months ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆262May 16, 2025Updated 10 months ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,476Jan 9, 2025Updated last year
- This tool can be used to brute discover GET and POST parameters☆1,396Aug 24, 2019Updated 6 years ago
- A curated list of the most common and most interesting robots.txt disallowed directories.☆1,485Aug 22, 2022Updated 3 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.☆549Jun 12, 2017Updated 8 years ago
- Sleepy Puppy XSS Payload Management Framework☆1,045Jul 24, 2018Updated 7 years ago
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowd☆194Apr 1, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.☆571Mar 4, 2023Updated 3 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆771Jan 3, 2021Updated 5 years ago
- OSCP Scripts☆14Jan 21, 2016Updated 10 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- Vulnerability scanner based on vulners.com search API☆887Oct 1, 2025Updated 5 months ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Aug 26, 2013Updated 12 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 9 years ago