synfron / ReshaperForBurp
Burp Suite Extension - Trigger actions and reshape HTTP request/response and WebSocket traffic using configurable rules
☆99Updated 4 months ago
Alternatives and similar repositories for ReshaperForBurp:
Users that are interested in ReshaperForBurp are comparing it to the libraries listed below
- Burp Extension for testing authorization issues. Automated request repeating and parameter value extraction on the fly.☆195Updated 9 months ago
- ☆87Updated 10 months ago
- Burp Extension for a passive scanning JS files for endpoint links.☆54Updated 4 months ago
- ☆70Updated 3 months ago
- Improve automated and semi-automated active scanning in Burp Pro☆61Updated 2 years ago
- Nuclei Templates to reproduce Cracking the lens's Research☆124Updated 3 years ago
- All Nuclei Templates☆67Updated last week
- ☆52Updated 3 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆117Updated last year
- Small Tool written based on chaos from projectdiscovery.io☆170Updated 5 months ago
- jolokia-exploitation-toolkit☆287Updated 3 months ago
- Burp Suite's extension to scan and crawl Single Page Applications☆102Updated last year
- Endpoints Explorer is a Python script that employs multiple bypass rules to discover sensitive endpoints☆83Updated 9 months ago
- Chrome extension that finds DOM based XSS vulnerabilities☆72Updated 2 years ago
- Burp Extension for a passive scanning JS files for endpoint links.☆167Updated 5 years ago
- Sensitive Discoverer, a Burp extension to discovers sensitive information inside HTTP messages.☆44Updated 4 months ago
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆86Updated 11 months ago
- ☆76Updated 10 months ago
- bounty collection☆34Updated 6 months ago
- WebLogic vulnerability exploration from beginner to expert.☆155Updated last year
- Cloud Penetration Testing Toolkit☆98Updated last month
- Scalpel is a Burp extension for intercepting and rewriting HTTP traffic, either on the fly or in the Repeater using Python 3 scripts.☆57Updated 9 months ago
- Nuclei templates for K8S security scanning☆101Updated 3 years ago
- Subdomains analysis and generation tool. Reveal the hidden!☆236Updated last week
- ☆115Updated 2 years ago
- ☆55Updated 2 years ago
- tetctf2020_amf_writeups☆23Updated 4 years ago
- CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to des…☆101Updated 11 months ago
- A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.☆112Updated last month
- Script to quickly install Golang and the most popular PD repos☆52Updated 7 months ago