llamaonsecurity / rio
A handy plugin for copying requests/responses directly from Burp, some extra magic included.
☆13Updated 3 years ago
Alternatives and similar repositories for rio:
Users that are interested in rio are comparing it to the libraries listed below
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- Tool to extract & validate google fcm server keys from apks☆28Updated 4 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 4 years ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Simple tools to handle string and generate subdomain permutations☆15Updated 2 years ago
- ☆9Updated 3 years ago
- Updated 4 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- View screenshots as a slideshow over http☆15Updated 5 years ago
- A BurpSuite plugin for BBRF☆24Updated 5 months ago
- ☆12Updated 3 years ago
- Tool to find stored robots.txt files from the past☆17Updated last year
- Gampung tools for find nuclei template from github☆10Updated last year
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- Insecure Deserialization, PDF and lab☆17Updated 5 years ago
- Extract subdomains from rapiddns.io☆23Updated 2 years ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- dummy shopping site for whitebox pentestig☆9Updated 2 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated 9 months ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Static analysis of APKs with regular expressions☆10Updated 3 years ago
- Take a list of URIs and print all the of the paths☆10Updated 4 years ago
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆15Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ☆13Updated 3 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Updated 3 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Updated 5 years ago
- Validate proxies for specific domain☆35Updated 3 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago