luxcupitor / burpsuite-extensionsLinks
BurpSuite Pro Python Extension
☆18Updated 11 years ago
Alternatives and similar repositories for burpsuite-extensions
Users that are interested in burpsuite-extensions are comparing it to the libraries listed below
Sorting:
- PHDAYS |||☆17Updated 12 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- ☆19Updated 8 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆32Updated 4 years ago
- Axis2 RPC Shell☆15Updated 9 years ago
- AV Bypass☆29Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- ☆21Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18Updated 5 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- Issues to consider when planning a red team exercise.☆15Updated 7 years ago
- Verification tools for CVE-2016-1287☆33Updated 8 years ago
- PIC code gen and loading☆13Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆45Updated 8 years ago