roglew / puppyLinks
the puppy proxy
☆22Updated 5 years ago
Alternatives and similar repositories for puppy
Users that are interested in puppy are comparing it to the libraries listed below
Sorting:
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Updated 3 years ago
- Drupal Honeypot☆57Updated 6 years ago
- SQL injection via bruteforced MD5 hash reflection of random strings☆51Updated 6 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆46Updated 8 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- Screenshot Shenanigans☆26Updated 7 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆20Updated 5 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 7 years ago
- ☆38Updated 5 years ago
- Smart DNS Brute Forcer☆22Updated 13 years ago
- CLI tool for PKCS7 padding oracle attacks☆139Updated 4 years ago
- fast, zero config web endpoint change monitor☆43Updated 5 years ago
- A better dns bruteforcer written in golang☆13Updated 6 years ago
- A program to map out SPF and DKIM records for a large number of domains☆38Updated 10 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Signatures for wraith used to detect secrets across various sources☆15Updated 3 years ago
- GO sandbox to run untrusted code☆42Updated 5 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12Updated 3 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago