neex / ghostinthepdf
☆164Updated 3 years ago
Alternatives and similar repositories for ghostinthepdf:
Users that are interested in ghostinthepdf are comparing it to the libraries listed below
- ☆94Updated 3 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 4 years ago
- ☆71Updated last year
- Burp Extension that copies a request and builds a FFUF skeleton☆111Updated last year
- ☆62Updated 2 years ago
- ☆71Updated 3 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆65Updated 4 years ago
- A simple remote scanner for Atlassian Jira☆120Updated 2 years ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- Client-Side Prototype Pollution Tools☆84Updated 3 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆132Updated 4 years ago
- ☆44Updated 4 years ago
- Detects request smuggling via HTTP/2 downgrades.☆92Updated 2 years ago
- ☆65Updated 2 years ago
- ☆148Updated 3 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Updated 4 years ago
- ☆76Updated 4 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated last year
- A simple tool to detect vulnerabilities described here https://portswigger.net/research/browser-powered-desync-attacks.☆36Updated 2 years ago
- Piper Burp Suite Extender plugin☆120Updated last year
- Script to test open Akamai ARL vulnerability.☆71Updated 3 years ago
- ☆25Updated 2 years ago
- ☆59Updated 9 months ago
- Improve automated and semi-automated active scanning in Burp Pro☆61Updated 2 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆87Updated 6 months ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆159Updated last year
- Wordlist to bruteforce for LFI☆123Updated 5 years ago
- ☆64Updated 3 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 3 months ago