koenrh / docker-burp-suite-pro
Burp Suite Professional in a Docker container.
☆81Updated last year
Alternatives and similar repositories for docker-burp-suite-pro:
Users that are interested in docker-burp-suite-pro are comparing it to the libraries listed below
- Manual JavaScript Linting is a Bug☆49Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 5 years ago
- Reclaim control of your Burp Suite Repeater tabs with this powerful extension☆67Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- A list of REST API URL paths for use in blackbox API end-point discovery☆25Updated 6 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Updated 5 years ago
- ☆147Updated 3 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- A logging DNS and HTTP(S) server. Opensource alternative to some parts of the Burpsuite Collaborator server.☆37Updated 7 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆62Updated 3 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆77Updated 5 years ago
- Find orphaned IP's on cloud services☆29Updated 5 years ago
- Default Linux files/images location☆28Updated 4 years ago
- ☆44Updated 4 years ago
- retrive metadata endpoint data with these one liners.☆37Updated 4 years ago
- ☆59Updated 7 months ago
- Some of my bug bounty tools☆48Updated 5 years ago
- Fetch the details of assets hosted on AWS.☆86Updated last year
- Burp as a Docker Container☆59Updated 4 years ago
- Push notifications for passive DNS data☆108Updated 8 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆100Updated last year
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆99Updated last year
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆42Updated 2 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆51Updated 3 years ago
- A set of simple servers (currently HTTP/HTTPS and DNS) which allow configurable and scriptable responses to network requests.☆61Updated 2 years ago
- Scan DockerHub images that match a keyword to find secrets.☆55Updated 4 years ago
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Updated 2 years ago
- AWS Security Checks☆36Updated 7 years ago