A extension for collecting parameters
☆25Oct 25, 2020Updated 5 years ago
Alternatives and similar repositories for Parmy
Users that are interested in Parmy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆113Jun 19, 2022Updated 3 years ago
- Chrome extension to detect possible xsleaks☆12May 4, 2019Updated 6 years ago
- ☆11May 28, 2020Updated 5 years ago
- A notification script to help with Recon Stuff☆14Jun 8, 2021Updated 4 years ago
- Wrapper around LinkFinder to quickly determine whether endpoints have been added/removed to JavaScript files.☆41Dec 27, 2019Updated 6 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Nov 20, 2020Updated 5 years ago
- ☆22Feb 12, 2022Updated 4 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 4 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Messy BurpSuite plugin for SQL Truncation vulnerabilities.☆63Apr 17, 2020Updated 5 years ago
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- PWN Challenge☆11Apr 28, 2022Updated 3 years ago
- CTF challenge per-team instance runner☆42Oct 30, 2025Updated 4 months ago
- CVE-2021-26855 & CVE-2021-27065☆28Mar 15, 2021Updated 5 years ago
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- Example of a vulnerable NodeJS+Express+MySQL service☆20Jan 17, 2023Updated 3 years ago
- This extension provides a central location for viewing all GraphQL requests/responses within a Burp project. It provides a clean UI that …☆15Feb 24, 2022Updated 4 years ago
- A collection of Browser DOM Vulnerabilities with PoCs☆40Nov 20, 2018Updated 7 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- Bruteforce a JWT against a list of passwords☆82Sep 16, 2017Updated 8 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- Small golang program for ssh brute force attacks☆11Jan 23, 2019Updated 7 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- Our PoC for the vulnerable products☆46Dec 1, 2021Updated 4 years ago
- Yahtzee simulator using C++ with some reinforcement learning☆13Feb 22, 2021Updated 5 years ago
- Motion graphics for HTTP error codes used in my site