Converts burp's sitemap to sulley's fuzzing script
☆11Aug 30, 2015Updated 10 years ago
Alternatives and similar repositories for burp2sulley
Users that are interested in burp2sulley are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The FTP fuzzer for Sulley and Peach.☆53Jan 4, 2014Updated 12 years ago
- Helping travelers stranded by Trump☆10Oct 5, 2022Updated 3 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Mar 20, 2017Updated 9 years ago
- Clipboard manager with fuzzy search (OS X only)☆14Feb 18, 2016Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Bash script to backup Citrix Xen VMs☆13May 5, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Scans an internal network using massscan and nmap☆19Nov 21, 2025Updated 4 months ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- ☆25May 22, 2017Updated 8 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Javascript library fuzzer. Tries to detect functions which may lead to XSS vulnerabilities if untrusted data is passed to said functions.☆16Oct 6, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- 自动批量检测java相关组件的rce漏洞,包括weblogic、struts2、shiro☆19Jan 3, 2020Updated 6 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆58Mar 9, 2017Updated 9 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- Zeus Gameover reverse engineering work☆16Feb 11, 2014Updated 12 years ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 记录一些python写的好东西(不一定都是python的)☆10Nov 17, 2020Updated 5 years ago
- jenkins payload☆17May 3, 2017Updated 8 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Jun 24, 2016Updated 9 years ago
- ☆12Sep 11, 2019Updated 6 years ago