rinetd / BurpSuite-1
BurpSuite using the document and some extensions
☆68Updated 4 years ago
Alternatives and similar repositories for BurpSuite-1:
Users that are interested in BurpSuite-1 are comparing it to the libraries listed below
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- ☆65Updated 2 years ago
- Information Security Information From Web☆27Updated 5 months ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆89Updated last year
- Vulnerable SAML infrastructure training applicaiton☆50Updated 2 years ago
- ☆71Updated 4 years ago
- ☆17Updated 3 years ago
- Detectify Crowdsource Challenge☆67Updated 2 years ago
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- NotSoCereal: A Deserialization exploit playground☆51Updated 3 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆96Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆86Updated 4 months ago
- ☆44Updated 3 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆80Updated 2 years ago
- ☆53Updated 9 months ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆42Updated last year
- HTTP verb tampering & methods enumeration☆56Updated 2 years ago
- Notes for CRTP☆39Updated 4 years ago
- OSWE Preparation☆37Updated 5 years ago
- Misc bounty and vulndisc things☆83Updated 4 years ago
- ☆47Updated 7 years ago
- Preparation for OSWE☆42Updated 4 years ago
- Python Duo Push API☆33Updated last month
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆130Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- Advanced Reconnaissance and Web Application Discovery☆79Updated 3 years ago
- Workshop given at Hack in Paris 2019☆121Updated last year