milo2012 / burpSQLLinks
Automating SQL injection using Burp Proxy Logs and SQLMap
☆27Updated 13 years ago
Alternatives and similar repositories for burpSQL
Users that are interested in burpSQL are comparing it to the libraries listed below
Sorting:
- "HeaderScan" Burp Plugin☆16Updated 11 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆23Updated 8 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Updated last year
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Updated 12 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 9 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- ☆47Updated 10 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 9 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Updated 12 years ago
- Enumerate subdomains through Virustotal☆32Updated 6 years ago
- Burp Intruder File Payload Generator☆18Updated 6 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Updated 7 years ago
- CVE-2017-8570 Exploit☆21Updated 8 years ago
- ☆46Updated 8 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 8 years ago
- A web app scanner☆24Updated 12 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Updated 13 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Updated 6 years ago
- ☆18Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Updated 12 years ago
- ☆24Updated 10 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- Xss Vulnerability Demonstration framework.☆12Updated 12 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Updated 8 years ago