matrix / Burp-NoSQLiScanner
This extension provides a way to discover NoSQL injection vulnerabilities.
☆23Updated last year
Alternatives and similar repositories for Burp-NoSQLiScanner:
Users that are interested in Burp-NoSQLiScanner are comparing it to the libraries listed below
- tool that generates bypasses for open redirects☆51Updated 2 years ago
- A FireBase DataBase TakeOver Tool along with POC Generator☆33Updated 3 years ago
- A web application attack surface mapping tool. It takes in a list of urls then performs numerous probes☆15Updated 2 years ago
- bug bounty automation☆13Updated 3 years ago
- ☆33Updated 3 weeks ago
- My fuzz repo!☆22Updated last year
- CVE-2022-41040 nuclei template☆18Updated 2 years ago
- ☆33Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Updated 3 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35Updated 8 months ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 2 years ago
- ☆42Updated 3 years ago
- XMLRPC - RCE in MovableTypePoC☆21Updated 2 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆28Updated 4 years ago
- public dns server list for dmut project☆18Updated last year
- Chameleon Wordlists☆15Updated 2 years ago
- This includes all the templates of nuclei collected from different sources☆17Updated 2 years ago
- ☆11Updated 3 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆34Updated 4 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Updated last year
- XSS reflector vulnerabilities exploitation extended.☆26Updated 3 years ago
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆33Updated 3 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆48Updated 2 years ago
- ☆26Updated 2 years ago
- Springboot detection☆21Updated 3 years ago
- Advanced Recon Tool☆26Updated 4 years ago
- ☆11Updated 2 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago