neex / ghostinthepdfLinks
☆170Updated 4 years ago
Alternatives and similar repositories for ghostinthepdf
Users that are interested in ghostinthepdf are comparing it to the libraries listed below
Sorting:
- ☆95Updated 4 years ago
- Burp Extension that copies a request and builds a FFUF skeleton☆112Updated 2 years ago
- ☆75Updated last year
- Workshop given at Hack in Paris 2019☆126Updated 2 years ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- ☆73Updated 4 years ago
- ☆65Updated 4 years ago
- ☆56Updated 4 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 3 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- Client-Side Prototype Pollution Tools☆86Updated 4 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆64Updated 7 months ago
- ☆76Updated 5 years ago
- Piper Burp Suite Extender plugin☆129Updated 2 weeks ago
- A simple remote scanner for Atlassian Jira☆121Updated 3 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆88Updated 2 weeks ago
- ☆87Updated last year
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆132Updated 4 years ago
- ☆44Updated 5 years ago
- Detects request smuggling via HTTP/2 downgrades.☆94Updated 3 years ago
- ☆29Updated 3 years ago
- Security Advisories☆35Updated 3 months ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 4 years ago
- A simple tool to detect vulnerabilities described here https://portswigger.net/research/browser-powered-desync-attacks.☆36Updated 3 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated 2 years ago
- Wordlist to bruteforce for LFI☆128Updated 6 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- ☆66Updated 3 years ago