kacperszurek / burp_wpLinks
Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.
☆180Updated 6 years ago
Alternatives and similar repositories for burp_wp
Users that are interested in burp_wp are comparing it to the libraries listed below
Sorting:
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆81Updated 2 years ago
- A Burp Extension designed to identify argument injection vulnerabilities.☆122Updated 6 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 10 years ago
- A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any yea…☆80Updated 7 years ago
- A centralized dashboard for running and scheduling WordPress scans powered by wpscan utility.☆77Updated 5 years ago
- Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop☆112Updated 6 years ago
- NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities☆106Updated 7 months ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 7 years ago
- ☆25Updated 7 years ago
- A web application for generating custom XSS payloads☆78Updated 5 years ago
- Various tools for managing bug bounty recon and exploration.☆48Updated 2 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- A Python3 based single-file subdomain enumerator☆89Updated 5 years ago
- This is a Firefox WebExtension that monitors the browsing activity and automatically perform an automated XSS vulnerability scan by submi…☆19Updated 8 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Updated 2 years ago
- Damn Vulnerable File Upload V 1.1☆101Updated 7 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Updated 6 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- This repository contains the POC of an exploit for node-jose < 0.11.0☆25Updated 2 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Updated 7 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- ☆34Updated 5 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Updated 5 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆49Updated 3 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 8 years ago
- WordpressPingbackPortScanner☆166Updated 6 years ago