mwielgoszewski / jython-burp-api
Develop Burp extensions in Jython
☆178Updated 8 years ago
Alternatives and similar repositories for jython-burp-api:
Users that are interested in jython-burp-api are comparing it to the libraries listed below
- (Deprecated) HQLmap, Automatic tool to exploit HQL injections☆228Updated 5 years ago
- CVE 2017-9805☆59Updated 4 years ago
- Web Input Vector Extractor Teaser☆132Updated 3 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Updated 7 years ago
- ☆78Updated 9 years ago
- YSOSERIAL Integration with burp suite☆164Updated 2 years ago
- a passive scanner based on Mitmproxy and Arachni☆111Updated 7 years ago
- java unserialize vul for weblogic exploit☆175Updated 6 years ago
- Central Repo for Burp extensions☆151Updated 3 years ago
- Proof of concept exploit, showing how to do bytecode injection through untrusted deserialization with Spring Framework 4.2.4☆116Updated 5 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆173Updated 8 years ago
- A python3 program to filter Burp Suite log file.☆77Updated 8 years ago
- ☆231Updated 9 years ago
- St2-052☆55Updated 7 years ago
- Flash XSS Scanner☆53Updated 8 years ago
- NagaScan is a distributed passive scanner for Web application.☆90Updated 7 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆289Updated 2 years ago
- CVE-2018-2893-PoC☆103Updated 6 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆46Updated 9 years ago
- Add headers to all Burp requests to bypass some WAF products☆331Updated 7 years ago
- Spring messaging STOMP protocol RCE☆113Updated 7 years ago
- DOOM是在thorn上实现的分布式任务分发的ip端口漏洞扫描器☆138Updated 9 years ago
- ☆46Updated 8 years ago
- ☆70Updated 8 years ago
- http://x0day.me/archives/bannerscan-py.html☆55Updated 10 years ago
- JBoss JMXInvokerServlet JMXInvoker 0.3 - Remote Command Execution 漏洞批量检测☆67Updated 9 years ago
- use docker to attack web as a demo☆85Updated 9 years ago
- CMS Exploit Framework☆192Updated 10 years ago
- ☆78Updated 10 years ago
- CVE-2019-3396 confluence SSTI RCE☆174Updated 4 years ago