koenrh / docker-burp-suite-proLinks
Burp Suite Professional in a Docker container.
☆84Updated 2 months ago
Alternatives and similar repositories for docker-burp-suite-pro
Users that are interested in docker-burp-suite-pro are comparing it to the libraries listed below
Sorting:
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- ☆36Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆65Updated 3 years ago
- A tool to evaluate Content Security Policies.☆71Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆106Updated last year
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- A natural evolution of Burp Suite's Repeater tool☆93Updated 2 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- ☆148Updated 3 years ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- Burp as a Docker Container☆59Updated 5 years ago
- Scan DockerHub images that match a keyword to find secrets.☆60Updated 4 years ago
- Burp with Friends☆103Updated 2 years ago
- Parse OpenAPI documents into Burp Suite for automating OpenAPI-based APIs security assessments (approved by PortSwigger for inclusion in …☆204Updated last year
- Reconnaissance tool for GitLab and GitHub organizations☆50Updated last year
- Burp Extension for AWS Signing☆89Updated 9 months ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- A logging DNS and HTTP(S) server. Opensource alternative to some parts of the Burpsuite Collaborator server.☆38Updated 7 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- AWS Security Checks☆40Updated 7 years ago
- ☆90Updated 3 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 3 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Updated 3 months ago
- vulnerable single sign on☆148Updated last year
- Automatically exported from code.google.com/p/fuzzdb☆64Updated 3 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆55Updated 5 years ago
- ☆28Updated 6 years ago
- A curated list of security tools for Hackers & Builders!☆100Updated last year
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 4 years ago