synopsys-sig / ATOR-BurpLinks
☆82Updated last year
Alternatives and similar repositories for ATOR-Burp
Users that are interested in ATOR-Burp are comparing it to the libraries listed below
Sorting:
- ☆59Updated 11 months ago
- ☆94Updated 3 years ago
- Burp Bounty profiles☆83Updated 3 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Updated 4 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated last year
- Detects request smuggling via HTTP/2 downgrades.☆92Updated 2 years ago
- ☆30Updated last year
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆91Updated 5 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆61Updated 3 weeks ago
- A simple tool to detect vulnerabilities described here https://portswigger.net/research/browser-powered-desync-attacks.☆36Updated 2 years ago
- Modified Nuclei Templates Version to FUZZ Host Header☆49Updated 3 years ago
- ☆64Updated 3 years ago
- ☆44Updated 5 years ago
- ☆44Updated 3 years ago
- Script to test open Akamai ARL vulnerability.☆71Updated 3 years ago
- Manual JavaScript Linting is a Bug☆49Updated 4 years ago
- ☆57Updated 5 months ago
- ☆61Updated 4 years ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆109Updated 3 years ago
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Updated 3 years ago
- ☆48Updated 4 years ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- Client-Side Prototype Pollution Tools☆84Updated 3 years ago
- Expand urls into one url for each path depth☆33Updated 4 years ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆42Updated 4 months ago
- Go fish for AWS EIPs☆46Updated 4 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆119Updated 2 years ago
- ☆95Updated 3 years ago
- Dump all available paths and/or endpoints on WADL file.☆93Updated 3 weeks ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆111Updated 3 years ago