ggabarrin / requestify
Parse a raw HTTP request and generate request code in different languages
☆34Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for requestify
- Use requests to send HTTP raw sockets (To Test RFC Compliance)☆20Updated 5 months ago
- #BugBounty #BugBounty Tools #WebDeveloper Tool☆34Updated 5 years ago
- A collection of utilities to simplify the creation of Burp Suite plugins☆22Updated 11 months ago
- ☆13Updated 4 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆32Updated 5 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 2 years ago
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆45Updated 3 years ago
- Broken Link Hijacking Burp Extension☆55Updated 5 years ago
- client-side prototype pullution vulnerability scanner☆46Updated 3 years ago
- CVE-2020-35728 & Jackson-databind RCE☆41Updated 3 years ago
- A Burp Suite extension to add a custom header (e.g. JWT)☆19Updated 2 years ago
- ☆13Updated last year
- ☆20Updated 3 years ago
- ☆33Updated 2 years ago
- Tool is to check for Cache Deception Attack Both For Authenticated and UnAuthenticated Pages☆43Updated 2 years ago
- A Burp extension to show the Collaborator client in a tab☆23Updated last year
- 该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。☆31Updated 3 years ago
- S2-061 CVE-2020-17530☆29Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆49Updated last year
- ☆63Updated 5 years ago
- CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE☆32Updated 4 years ago
- Burp Extension to manipulate AES encrypted payloads☆15Updated 2 years ago
- ☆27Updated 4 years ago
- burp extender for fuzzing☆10Updated 6 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆21Updated 2 years ago
- Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data☆26Updated 3 years ago
- ☆55Updated 3 years ago