BurpSuite dockerized
☆11Mar 2, 2018Updated 7 years ago
Alternatives and similar repositories for burp
Users that are interested in burp are comparing it to the libraries listed below
Sorting:
- Burp as a Docker Container☆59Aug 21, 2020Updated 5 years ago
- Burp Suite Professional in a Docker container.☆84Nov 20, 2025Updated 3 months ago
- Dotfiles☆16Jun 18, 2018Updated 7 years ago
- 🌊 Dockerfiles for apps I use. Also take a look at https://github.com/security-dockerfiles☆24Dec 24, 2020Updated 5 years ago
- Pickleib helps automate tests for WebUI, MobileUI, Desktop UI, API, Email, DataBase, Localisation and more!☆12Feb 13, 2026Updated 2 weeks ago
- PoC for the CVE-2023-49103☆30Dec 2, 2023Updated 2 years ago
- DNS2Proxy offensive proxy version for HSTS☆29Jan 1, 2018Updated 8 years ago
- Cheatsheets on security vulnerabilities and exploits.☆34Jan 20, 2020Updated 6 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Lazy Load WordPress Images, Videos, Iframes to improve your website performance.☆11Jan 29, 2026Updated last month
- CVE-2019-2729 Exploit Script☆46Feb 19, 2020Updated 6 years ago
- An example of what I would have found helpful when I first starting working with RequireJS.☆16Mar 12, 2015Updated 10 years ago
- BMW CarData MQTT client and bridge – Connects the BMW ConnectedDrive data stream to a local Mosquitto MQTT broker.☆41Oct 19, 2025Updated 4 months ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- ☆10Oct 12, 2018Updated 7 years ago
- A clear input plugin for angualrjs☆13Mar 3, 2016Updated 9 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- ☆15Sep 4, 2024Updated last year
- Nmap NSE script for enumerate indices, plugins and cluster nodes on an elasticsearch target☆42Apr 17, 2021Updated 4 years ago
- 蜜罐捕获的数据☆11May 16, 2016Updated 9 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Environment for CVE-2018-1273 (Spring Data Commons)☆10Aug 15, 2018Updated 7 years ago
- ☆14Jan 16, 2017Updated 9 years ago
- an implementation of scope activerecord in jquery for declarative scopes☆12Sep 4, 2012Updated 13 years ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆25Jan 31, 2026Updated last month
- Making me more antisocial and weird.☆10Oct 6, 2020Updated 5 years ago
- A dynamic reducer and middleware registry for Redux.☆10Dec 15, 2021Updated 4 years ago
- Our interviewing prep resources.☆10Jan 12, 2016Updated 10 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Twig Tutorial Theme based on Neat for Tuts+☆10Oct 12, 2017Updated 8 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- A very simple collection of MIDI data utilities for JavaScript.☆14Jan 19, 2015Updated 11 years ago
- An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE☆10Nov 15, 2024Updated last year
- Interactive C Programming Self-Learning Course☆24Oct 6, 2025Updated 4 months ago