summitt / Nope-ProxyLinks
TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.
☆1,638Updated last year
Alternatives and similar repositories for Nope-Proxy
Users that are interested in Nope-Proxy are comparing it to the libraries listed below
Sorting:
- ☆895Updated last year
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,676Updated 10 months ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,107Updated 9 months ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,480Updated 5 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆796Updated 3 years ago
- The new bridge between Burp Suite and Frida!☆1,750Updated 2 weeks ago
- Hackish way to intercept and modify non-HTTP protocols through Burp & others.☆609Updated last year
- The cheat sheet about Java Deserialization vulnerabilities☆3,136Updated 2 years ago
- Burp Plugin to decrypt AES encrypted traffic on the fly☆644Updated 3 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,022Updated 4 years ago
- Automated HTTP Request Repeating With Burp Suite☆883Updated 3 years ago
- HackBar plugin for Burpsuite☆1,596Updated 4 years ago
- AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services.☆632Updated last year
- Vulnerability Labs for security analysis☆1,174Updated 4 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,436Updated last year
- Advanced Burp Suite Logging Extension☆677Updated last year
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,118Updated 7 months ago
- Rip web accessible (distributed) version control systems: SVN/GIT/HG...☆1,762Updated last year
- Java RMI enumeration and attack tool.☆743Updated 8 years ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆732Updated 6 years ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,572Updated 2 years ago
- Automated script for performing Padding Oracle attacks☆796Updated last year
- ODAT: Oracle Database Attacking Tool☆1,704Updated last year
- Linux Exploit Suggester; based on operating system release number☆1,804Updated 11 years ago
- Vulnerability scanner based on vulners.com search API☆873Updated last week
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,041Updated last year
- MS17-010☆2,213Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆591Updated 4 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,264Updated 3 years ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆814Updated 7 years ago