justmorpheus / burp-automationLinks
Performing automated scan using Burp Suite Pro & Vmware Burp Rest API
☆50Updated 2 years ago
Alternatives and similar repositories for burp-automation
Users that are interested in burp-automation are comparing it to the libraries listed below
Sorting:
- ☆57Updated last year
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated last year
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆60Updated 2 years ago
- vīlicus is a bug bounty api dashboard☆41Updated 2 years ago
- Some contributions in the nuclei-templates repository☆58Updated 3 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- ☆48Updated 4 years ago
- Script for Bug Bounty☆29Updated 3 years ago
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆128Updated last year
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- goverview - Get an overview of the list of URLs☆142Updated 2 years ago
- The commands and scripts I used in the Live Recon Village talks☆38Updated 4 years ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆58Updated 10 months ago
- Enhanced 403 bypass header☆21Updated 2 years ago
- Tool for making it easy to collect dns results from the CLI☆40Updated last year
- A Burp Suite Extension for parsing Project Files from the CLI.☆87Updated 10 months ago
- security.txt collection of most popular world-wide domains☆54Updated last year
- ☆94Updated 3 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆92Updated last month
- Running nuclei Continuously☆57Updated 2 years ago
- Dependency Confusion Security Testing Tool☆49Updated 3 years ago
- Basic implementation of certstream to print new subdomains and domains☆35Updated 4 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆113Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- ☆26Updated 2 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 5 years ago
- ☆67Updated 2 years ago
- Execute Trickest workflows right from your terminal☆93Updated this week
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago