hvqzao / burp-flow
Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.
☆47Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for burp-flow
- Another plugin for CRLF vulnerability detection☆26Updated 7 years ago
- Burp Suite extension for JAX-RS☆65Updated 7 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 10 years ago
- Burp extension to passively scan for applications revealing software version numbers☆30Updated 5 months ago
- Study about HQL injection exploitation.☆49Updated 8 years ago
- Burp extension☆57Updated 6 years ago
- CORS checking☆35Updated 6 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 2 years ago
- OWASP Skanda - SSRF Exploitation Framework☆36Updated 11 years ago
- ☆70Updated 7 years ago
- ☆34Updated 5 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 5 years ago
- Burp Suite Attack Selector Plugin☆62Updated 6 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 4 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆49Updated 5 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆103Updated 6 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated 8 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 7 years ago
- ☆41Updated 4 years ago
- Various tools for managing bug bounty recon and exploration.☆46Updated last year
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 8 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 6 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 6 years ago
- A server vulnerable to XXE that can be used to test payloads using the xxer tool.☆25Updated 6 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 7 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆52Updated 11 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆121Updated 6 years ago