summitt / Nope-ProxyLinks
TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.
☆1,637Updated last year
Alternatives and similar repositories for Nope-Proxy
Users that are interested in Nope-Proxy are comparing it to the libraries listed below
Sorting:
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,684Updated 11 months ago
- ☆896Updated last year
- The new bridge between Burp Suite and Frida!☆1,763Updated last week
- A tool for embedding XXE/XML exploits into different filetypes☆1,113Updated 10 months ago
- Burp Plugin to decrypt AES encrypted traffic on the fly☆647Updated 3 years ago
- Hackish way to intercept and modify non-HTTP protocols through Burp & others.☆613Updated last year
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆796Updated 3 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,480Updated 5 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,142Updated 2 years ago
- AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services.☆632Updated last year
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,025Updated 4 years ago
- Advanced Burp Suite Logging Extension☆679Updated last year
- Java RMI enumeration and attack tool.☆743Updated 8 years ago
- HackBar plugin for Burpsuite☆1,597Updated 4 years ago
- Automated HTTP Request Repeating With Burp Suite☆884Updated 3 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,127Updated 7 months ago
- SSRF (Server Side Request Forgery) testing resources☆2,440Updated last year
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆732Updated 6 years ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,585Updated 2 years ago
- Automated script for performing Padding Oracle attacks☆795Updated last year
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,060Updated last year
- Rip web accessible (distributed) version control systems: SVN/GIT/HG...☆1,763Updated last year
- Vulnerability Labs for security analysis☆1,173Updated 4 years ago
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆1,111Updated 4 months ago
- Vulnerability scanner based on vulners.com search API☆875Updated last month
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,449Updated 4 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,063Updated 4 years ago
- A DNS rebinding attack framework.☆1,194Updated last week
- ☆1,155Updated last month
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,879Updated 3 years ago