This Burp Suite extension allows you to copy HTTP requests without including cookies or tokens.
☆37Jun 14, 2023Updated 2 years ago
Alternatives and similar repositories for requestCleaner
Users that are interested in requestCleaner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- vīlicus is a bug bounty api dashboard☆41Aug 13, 2023Updated 2 years ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆96Jan 2, 2025Updated last year
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Automated Tool for Testing Header Based Blind SQL Injection☆323Jul 23, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A python tool to test for web cache poisoning denial of service (CPDoS) vulnerabilities.☆15Oct 19, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Filter URLs to save your time.☆60Jul 29, 2022Updated 3 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆16Mar 13, 2022Updated 4 years ago
- WordPress Plugin Update Confusion☆67Dec 7, 2021Updated 4 years ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Mar 7, 2024Updated 2 years ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Feb 14, 2025Updated last year
- A Terraform framework for deploying to Oracle Cloud Infrastructure. This is the landing zone (starting point) for the framework.☆13Jan 21, 2025Updated last year
- ☆11Dec 5, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PassMute - A multi featured Password Transmutation/Mutator Tool☆55Jun 18, 2023Updated 2 years ago
- World CIDR IP lists☆10Jan 28, 2026Updated 3 months ago
- ☆26Jun 5, 2024Updated last year
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated last year
- I collected it to help the bug hunter get a reward☆57Sep 7, 2022Updated 3 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 4 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Never forget where you inject.☆301Aug 15, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- JScripter is a Python script designed to scrape and save unique JavaScript files from a list of URLs or a single URL.☆29Nov 26, 2024Updated last year
- Dynamically deploy containers for CTF challenges.☆23Nov 29, 2025Updated 5 months ago
- Recon-Ninja☆87Mar 24, 2024Updated 2 years ago
- This is Same as Burpsuite Collaborator | Free | Burpsuite Collaborator Server☆13Jun 27, 2025Updated 10 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆165Apr 17, 2023Updated 3 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- Hints for the Kusto Detective Agency - Season 2☆10Aug 15, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- ☆16Aug 25, 2025Updated 8 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Collection's of Tech Talk that are presented by me :)☆102Jan 12, 2025Updated last year
- Symfony2 < 2.5.4 profiler exploit☆13Sep 30, 2015Updated 10 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Sep 25, 2023Updated 2 years ago
- Statement on Codegate Qualifiers 2023☆11Jun 19, 2023Updated 2 years ago