summitt / Nope-ProxyLinks
TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.
☆1,635Updated last year
Alternatives and similar repositories for Nope-Proxy
Users that are interested in Nope-Proxy are comparing it to the libraries listed below
Sorting:
- ☆887Updated last year
- A tool for embedding XXE/XML exploits into different filetypes☆1,104Updated 8 months ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,662Updated 8 months ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆793Updated 3 years ago
- The new bridge between Burp Suite and Frida!☆1,735Updated last year
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,475Updated 5 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,125Updated 2 years ago
- HackBar plugin for Burpsuite☆1,593Updated 4 years ago
- Automated HTTP Request Repeating With Burp Suite☆879Updated 3 years ago
- Rip web accessible (distributed) version control systems: SVN/GIT/HG...☆1,761Updated last year
- Advanced Burp Suite Logging Extension☆674Updated last year
- Java RMI enumeration and attack tool.☆742Updated 7 years ago
- Burp Plugin to decrypt AES encrypted traffic on the fly☆645Updated 3 years ago
- Hackish way to intercept and modify non-HTTP protocols through Burp & others.☆609Updated last year
- AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services.☆630Updated last year
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,019Updated 4 years ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,557Updated last year
- SSRF (Server Side Request Forgery) testing resources☆2,426Updated 10 months ago
- Vulnerability Labs for security analysis☆1,173Updated 4 years ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆729Updated 6 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,109Updated 5 months ago
- Vulnerability scanner based on vulners.com search API☆869Updated 3 weeks ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,015Updated last year
- ☆1,117Updated last week
- Simple reverse ICMP shell☆1,602Updated 7 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,264Updated 2 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,056Updated 4 years ago
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆1,096Updated last month
- Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.☆1,639Updated 3 weeks ago
- Sample codes written for the Hackers to Hackers Conference magazine 2017 (H2HC).☆509Updated 3 years ago