milo2012 / burpSQLLinks
Automating SQL injection using Burp Proxy Logs and SQLMap
☆27Updated 13 years ago
Alternatives and similar repositories for burpSQL
Users that are interested in burpSQL are comparing it to the libraries listed below
Sorting:
- ☆23Updated 10 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Updated 12 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Updated 12 years ago
- ☆47Updated 9 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Updated 7 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆24Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- "HeaderScan" Burp Plugin☆16Updated 11 years ago
- Generate pentest reports based on github issues.☆16Updated 2 years ago
- Burp Extender to add unique form tokens to scanner requests.☆14Updated 11 months ago
- Burp Intruder File Payload Generator☆18Updated 5 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 13 years ago
- Study about HQL injection exploitation.☆51Updated 9 years ago
- Xss Vulnerability Demonstration framework.☆12Updated 12 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Updated 11 years ago
- ☆46Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- CVE-2017-8570 Exploit☆21Updated 8 years ago
- OWASP Skanda - SSRF Exploitation Framework☆37Updated 12 years ago
- ☆11Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- ☆17Updated 7 years ago
- a collection of payloads for common webapps☆72Updated 12 years ago