snyk / socketsleuthLinks
Burp Extension to add additional functionality for pentesting websocket based applications
☆96Updated last year
Alternatives and similar repositories for socketsleuth
Users that are interested in socketsleuth are comparing it to the libraries listed below
Sorting:
- ☆105Updated 2 years ago
- ☆37Updated last month
- ☆38Updated 2 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆64Updated 3 months ago
- Repository to store exploits created by Assetnotes Security Research team☆180Updated last year
- A GraphQL enumeration and extraction tool☆132Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated last year
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆60Updated 2 years ago
- NotSoCereal: A Deserialization exploit playground☆53Updated 3 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆51Updated last year
- CVE-2023-33733 reportlab RCE☆119Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆29Updated last year
- ☆82Updated last month
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆77Updated last year
- Scalpel is a Burp extension for intercepting and rewriting HTTP traffic, either on the fly or in the Repeater using Python 3 scripts.☆63Updated last year
- ☆76Updated last year
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆89Updated last year
- Improve automated and semi-automated active scanning in Burp Pro☆61Updated last month
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆87Updated last year
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆116Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆163Updated 2 years ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆104Updated 2 months ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆67Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 6 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆55Updated last year
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 2 years ago
- ☆26Updated 2 years ago
- Burp Extension that copies a request and builds a FFUF skeleton☆111Updated last year