summitt / Nope-Proxy
TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.
☆1,560Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for Nope-Proxy
- The new bridge between Burp Suite and Frida!☆1,645Updated 7 months ago
- Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.☆1,540Updated 4 years ago
- HackBar plugin for Burpsuite☆1,540Updated 3 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,037Updated 4 months ago
- ☆835Updated 10 months ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆776Updated 3 years ago
- Burp Plugin to decrypt AES encrypted traffic on the fly☆634Updated 2 years ago
- Advanced Burp Suite Logging Extension☆630Updated 5 months ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,037Updated last year
- Hackish way to intercept and modify non-HTTP protocols through Burp & others.☆582Updated 6 months ago
- SSRF (Server Side Request Forgery) testing resources☆2,352Updated last month
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆2,422Updated 4 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,031Updated 4 years ago
- A Burp Suite extension to help pentesters to bypass WAFs or test their effectiveness using a number of techniques☆709Updated 5 years ago
- Automated HTTP Request Repeating With Burp Suite☆846Updated 2 years ago
- AuthMatrix is a Burp Suite extension that provides a simple way to test authorization in web applications and web services.☆614Updated 8 months ago
- Vulnerability Labs for security analysis☆1,158Updated 3 years ago
- Rip web accessible (distributed) version control systems: SVN/GIT/HG...☆1,706Updated 4 months ago
- Automated script for performing Padding Oracle attacks☆751Updated 4 months ago
- Java RMI enumeration and attack tool.☆715Updated 7 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,794Updated 7 months ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆2,873Updated last year
- Linux Exploit Suggester; based on operating system release number☆1,779Updated 10 years ago
- Simple reverse ICMP shell☆1,561Updated 6 years ago
- A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.☆1,398Updated 3 years ago
- MS17-010☆2,146Updated last year
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆976Updated 3 years ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,453Updated last year
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,241Updated 2 years ago
- Vulnerability scanner based on vulners.com search API☆834Updated 7 months ago