honoki / burp-digitalocean-openvpn-socksView external linksLinks
A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it
☆50Nov 5, 2025Updated 3 months ago
Alternatives and similar repositories for burp-digitalocean-openvpn-socks
Users that are interested in burp-digitalocean-openvpn-socks are comparing it to the libraries listed below
Sorting:
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 1, 2024Updated 2 years ago
- ☆12Dec 3, 2022Updated 3 years ago
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated last year
- This extension enhances Burp Suite by adding several UI and functional features, making it more user-friendly.☆75Dec 17, 2024Updated last year
- ☆59Nov 13, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆14Mar 19, 2024Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Feb 13, 2022Updated 4 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- ☆13Aug 10, 2022Updated 3 years ago
- Make better use of the embedded browser that comes by default with Burp☆43Jan 1, 2024Updated 2 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- Custom scan profiles for use with Burp Suite Pro☆151Mar 21, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)☆23Mar 16, 2024Updated last year
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- A tool to migrate Burpsuite HTTP history to Caido☆35Apr 25, 2025Updated 9 months ago
- Basic website cloner written in Python☆55Sep 13, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Feb 26, 2025Updated 11 months ago
- Reverse shell that can bypass windows defender detection☆169Feb 3, 2024Updated 2 years ago
- ☆110Feb 13, 2024Updated 2 years ago
- Updated version of the ProtoBurp Extension, with enhanced features and capabilities to encode and fuzz custom protobuf messages☆36Sep 11, 2023Updated 2 years ago
- ☆12Jun 26, 2023Updated 2 years ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆417Jan 31, 2026Updated 2 weeks ago
- ☆15Sep 4, 2024Updated last year
- ☆21May 27, 2024Updated last year
- A fast subdomain takeover tool☆85Nov 10, 2023Updated 2 years ago
- ☆20Jan 9, 2024Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Dec 18, 2023Updated 2 years ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆165Jul 16, 2023Updated 2 years ago
- ☆179Aug 23, 2025Updated 5 months ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Mar 24, 2020Updated 5 years ago