nahamsec / burpyLinks
Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the module provided and finally generate a HTML report.
☆36Updated 9 years ago
Alternatives and similar repositories for burpy
Users that are interested in burpy are comparing it to the libraries listed below
Sorting:
- Intelligence gathering framework☆15Updated 10 years ago
- use at your own risk☆37Updated 5 years ago
- Notes from OSCP, CTF, security adventures, etc...☆62Updated last year
- Web application pentesting recon☆23Updated 5 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- Simple shell script for automated domain recognition with some tools☆20Updated 6 years ago
- A simple reconnaissance framework for bug bounty hunting☆37Updated 4 years ago
- Host Header Injection Scanner☆45Updated 4 years ago
- Simultaneously execute various subdomain enumeration tools and aggregate results.☆43Updated last year
- Source code for Hacker101.com - a free online web and mobile security class.☆12Updated 3 years ago
- Spaghetti - Web Application Security Scanner☆20Updated 8 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids.☆31Updated 7 years ago
- Handy bash and python scripts for bug bounty hunting!☆47Updated 4 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆22Updated 5 years ago
- Bash script to automate Bug Bounty Reconnaissance☆44Updated 4 years ago
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆46Updated 6 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆20Updated 5 years ago
- Rockyou for web fuzzing☆15Updated 3 years ago
- Passive subdomain enumeration tool with http-probe.☆33Updated 4 years ago
- In-depth Attack Surface Mapping and Asset Discovery☆24Updated 5 years ago
- Domain availbility checker☆39Updated 4 years ago
- Offsec Pentest and Bug Bounty Notes☆25Updated 5 years ago
- A simple CLI tool to check WebDAV vulnerability☆14Updated 4 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20Updated 5 years ago
- Pipe different tools with google dork Scanner☆57Updated 5 years ago
- Framework to automate Bug Bounty Reconnaissance☆44Updated 4 years ago
- BugBuntu Linux☆15Updated 4 years ago
- ☆53Updated 7 months ago
- Toolset for detecting reflected xss in websites☆15Updated 6 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrato…☆66Updated 3 years ago