debasishm89 / burpy
Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the module provided and finally generate a HTML report.
☆118Updated 6 years ago
Related projects: ⓘ
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆168Updated 8 years ago
- ☆207Updated this week
- BountyDash is a tool to combine your rewards from all platforms, giving you insights about your progress and bug hunting patterns.☆139Updated last year
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆257Updated 3 years ago
- Project "Flashbang" - An open-source Flash-security helper☆206Updated 9 years ago
- ☆115Updated this week
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions☆215Updated 2 years ago
- ☆178Updated 10 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆301Updated 5 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆130Updated last year
- Web Application Security☆121Updated 3 months ago
- It's bloody scantastic☆232Updated 2 years ago
- Usefull stuff from around teh internetz☆109Updated 6 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆252Updated 3 months ago
- Notes/Tools for pentesting☆82Updated 9 months ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆162Updated 4 years ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 5 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 5 years ago
- ☆119Updated 7 years ago
- ☆270Updated 2 years ago
- PwnWiki - The notes section of the pentesters mind.☆24Updated 10 years ago
- Tools of "The Bug Hunters Methodology V2 by @jhaddix"☆194Updated 7 years ago
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆219Updated last year
- Albatar is a SQLi exploitation framework in Python☆132Updated 3 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆100Updated 4 years ago
- ☆317Updated 6 years ago
- Actarus is a custom tool for bug bounty☆75Updated 4 years ago
- Local File Inclusion Exploitation Tool (mirror)☆121Updated 7 years ago
- ☆160Updated 6 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆70Updated 5 years ago