A powerful Burp Suite extension that helps in converting requests between different formats, making web application testing more efficient.
☆13Nov 18, 2024Updated last year
Alternatives and similar repositories for Convert-Type-Convert-All
Users that are interested in Convert-Type-Convert-All are comparing it to the libraries listed below
Sorting:
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated last year
- PoC for CVE-2024-42327 / ZBX-25623☆18Dec 3, 2024Updated last year
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 7 months ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆24Dec 28, 2025Updated 2 months ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆26Mar 31, 2024Updated last year
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- 👀 All-Seeing Eye: Arbitrary File Read Vulnerability in Chrome Versions Prior to 116☆10Nov 18, 2023Updated 2 years ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- A prompt-based pipeline for finding, validating, and proving vulnerabilities using LLM sub-agents.☆45Feb 22, 2026Updated 3 weeks ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 7 months ago
- ☆11Apr 23, 2025Updated 10 months ago
- Tailscale Domain Management Gateway: allow Tailscale nodes to retrieve public (Let's Encrypt) TLS certificates for custom domains.☆40Feb 11, 2026Updated last month
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆121Jan 29, 2026Updated last month
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- ☆11Oct 25, 2021Updated 4 years ago
- Store 4TB in 5GB: S3-compatible storage with 99.9% compression for versioned files☆33Updated this week
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆12Jun 18, 2018Updated 7 years ago
- A Windows kernel driver viewer and manager built in Rust — real-time enumeration, signature verification, SCM operations, and multi-for…☆105Updated this week
- Burp Suite extension to detect Web Cache Deception vulnerabilities, now compatible with the Community Edition. Automates advanced cache …☆19Nov 18, 2025Updated 4 months ago
- Automation of KNOXSS extension.☆11Apr 12, 2019Updated 6 years ago
- Java安全相关,目前主要是CC链研究☆10Sep 1, 2022Updated 3 years ago
- Quarks PwDump is a native Win32 tool to extract credentials from Windows operating systems.☆12Jun 25, 2015Updated 10 years ago
- Toolbox for modifying/updating/backing up Nissan LEAF Head Unit☆27Nov 30, 2025Updated 3 months ago
- بوت الاذكار ومواقيت الصلاة☆10Aug 27, 2022Updated 3 years ago
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆57Jan 14, 2025Updated last year
- 废物自救项目!一起向光而行!!!☆11May 7, 2022Updated 3 years ago
- Let's make quick work of GraphQL instances ;)☆24Mar 8, 2026Updated last week
- PathShield is an anti-tracking tool for M5StickC Plus v1/2 that uses BLE & WiFI scanning to detect and alert you to devices following you…☆44Jan 19, 2026Updated 2 months ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated 2 months ago
- 这是由Rust实现的纯Socks5协议☆12May 11, 2024Updated last year
- Scripts and package lists used to build image files on voidbuilds.xyz☆10Mar 20, 2024Updated 2 years ago
- ☆176Oct 21, 2025Updated 4 months ago
- ☆13Jan 4, 2022Updated 4 years ago
- 改造一个基于jrmp的AMF反序列化利用工具☆16Jul 7, 2022Updated 3 years ago
- Tactical Race Exploitation & Concurrency Orchestrator☆25Jan 4, 2026Updated 2 months ago
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆33Jan 19, 2026Updated 2 months ago
- LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms☆53Updated this week
- ☆19Jan 8, 2026Updated 2 months ago