Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet
☆56Oct 23, 2024Updated last year
Alternatives and similar repositories for burp-digitalocean-droplet-proxy
Users that are interested in burp-digitalocean-droplet-proxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Burp Suite extension allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services.☆246Mar 17, 2025Updated last year
- Filter and enrich a list of subdomains by level☆213Sep 25, 2023Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆141Sep 16, 2024Updated last year
- DNS and Target HTTP History Local Storage and Search☆63Feb 14, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.☆59Jan 22, 2023Updated 3 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆458Oct 3, 2023Updated 2 years ago
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- vīlicus is a bug bounty api dashboard☆41Aug 13, 2023Updated 2 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆293Jan 15, 2025Updated last year
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆156Nov 24, 2023Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,065Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- convert secret patterns to gf compatible.☆38Feb 11, 2023Updated 3 years ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆44Sep 22, 2024Updated last year
- Unleash the power of cloud☆815Nov 19, 2024Updated last year
- Swisscom Vulnerability Disclosure Policy & Bug Bounty Programme☆128Mar 9, 2026Updated 2 weeks ago
- Alternative to XSS Hunter for blind XSS.☆50Dec 8, 2022Updated 3 years ago
- ☆43Mar 2, 2026Updated 3 weeks ago
- ☆18Nov 18, 2022Updated 3 years ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Sep 23, 2025Updated 6 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆237Mar 23, 2026Updated last week
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆36Oct 17, 2021Updated 4 years ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Mar 12, 2026Updated 2 weeks ago
- Distribute ordinary bash commands over many systems☆167Aug 29, 2022Updated 3 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆754Dec 19, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆77Dec 29, 2019Updated 6 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- Some wordlists collected form github to all bug bounty hunters.☆40Jul 30, 2021Updated 4 years ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆179Jan 12, 2026Updated 2 months ago
- Gotator is a tool to generate DNS wordlists through permutations.☆509Jul 17, 2022Updated 3 years ago
- An IIS short filename enumeration tool☆1,132Nov 25, 2024Updated last year