rinetd / BurpSuite-1Links
BurpSuite using the document and some extensions
☆71Updated 5 years ago
Alternatives and similar repositories for BurpSuite-1
Users that are interested in BurpSuite-1 are comparing it to the libraries listed below
Sorting:
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆98Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- HTTP parameter discovery suite.☆63Updated 5 years ago
- Detectify Crowdsource Challenge☆70Updated 3 years ago
- ☆72Updated 5 years ago
- NotSoCereal: A Deserialization exploit playground☆54Updated 3 years ago
- ☆17Updated 4 years ago
- A python based blind SQL injection exploitation script☆141Updated 5 years ago
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆63Updated 5 years ago
- ☆76Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆57Updated 5 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- xss development frameworks, with the goal of making payload writing easier.☆153Updated last year
- ☆132Updated 4 years ago
- The Web Security Testing Guide is a comprehensive open source guide to testing the security of web applications and web services.☆31Updated last month
- ☆27Updated 5 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆19Updated 7 years ago
- Information Security Information From Web☆28Updated 4 months ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆81Updated 3 years ago
- ☆67Updated 3 years ago
- ☆17Updated 3 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆87Updated last year
- ☆42Updated 2 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- Notes for CRTP☆42Updated 5 years ago
- ☆23Updated 4 years ago
- Clientside vulnerability / reflected xss fuzzer☆149Updated 2 years ago