ernw / burpsuite-extensions
A collection of Burp Suite extensions
☆30Updated 8 years ago
Alternatives and similar repositories for burpsuite-extensions:
Users that are interested in burpsuite-extensions are comparing it to the libraries listed below
- A small collection of Burp Suite extensions, written in Python☆10Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- ☆47Updated 9 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Basic Auth Phish page☆25Updated 7 years ago
- WhiteBox CMS analysis☆69Updated last year
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- OSCP related stuff ^_^ - Try Harder!☆9Updated 6 years ago
- Hacking challenges☆32Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 7 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Scan for open S3 buckets and dump☆36Updated 7 years ago
- Automated enumeration☆30Updated 3 years ago
- Updated 6 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Custom stagers with python encrypting proxy☆39Updated 9 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆55Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- Issues to consider when planning a red team exercise.☆15Updated 7 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago