Burp plugin to turn requests into curl commands
☆16Apr 25, 2014Updated 11 years ago
Alternatives and similar repositories for curlit
Users that are interested in curlit are comparing it to the libraries listed below
Sorting:
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Yet another dynamic routine hooking library for OS X. Uses Mach exception handlers.☆11Feb 7, 2016Updated 10 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- A scriptable debugger library to interact with Android applications☆46Sep 27, 2013Updated 12 years ago
- ☆15Sep 24, 2015Updated 10 years ago
- A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly☆18Oct 7, 2015Updated 10 years ago
- An Android port of the general purpose honggfuzz fuzzer☆19Aug 20, 2015Updated 10 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 11 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- A tool for netpens.☆37Jun 18, 2019Updated 6 years ago
- Fuzz testing framework for security research☆30Jun 19, 2014Updated 11 years ago
- Random Code☆25Apr 18, 2011Updated 14 years ago
- Scans iPhone/iPad/iPod applications for PIE flags☆32Mar 4, 2012Updated 13 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Apr 1, 2014Updated 11 years ago
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- Discover GPS location and private data exposure inside of images using this Burp & ZAP plugin.☆17Jun 18, 2025Updated 8 months ago
- XSS Hunter correlated injection API guide☆21Mar 24, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- Yet Another SWF Parser☆33Mar 4, 2022Updated 3 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- XXE vulnerability demo☆22Jun 1, 2014Updated 11 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆23Dec 5, 2017Updated 8 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Aug 7, 2015Updated 10 years ago