justmorpheus / burp-automationLinks
Performing automated scan using Burp Suite Pro & Vmware Burp Rest API
☆52Updated 3 years ago
Alternatives and similar repositories for burp-automation
Users that are interested in burp-automation are comparing it to the libraries listed below
Sorting:
- ☆58Updated last year
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated last year
- ☆48Updated 4 years ago
- vīlicus is a bug bounty api dashboard☆41Updated 2 years ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- Some contributions in the nuclei-templates repository☆60Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Updated 4 years ago
- Basic implementation of certstream to print new subdomains and domains☆36Updated 4 years ago
- Tool for making it easy to collect dns results from the CLI☆40Updated last year
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- The commands and scripts I used in the Live Recon Village talks☆39Updated 4 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆80Updated 2 years ago
- Enhanced 403 bypass header☆21Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated last year
- Get all the CNs from a list of domains☆45Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- ☆95Updated 4 years ago
- ☆67Updated 3 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Updated 5 months ago
- Find subdomains and takeovers.☆86Updated 3 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago
- It's an watcher for new scopes added to bounty-targets-data and send you alert to Slack.☆59Updated 3 years ago
- Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet☆57Updated last year