tls-attacker / TLS-Attacker-BurpExtension
☆38Updated 4 years ago
Alternatives and similar repositories for TLS-Attacker-BurpExtension:
Users that are interested in TLS-Attacker-BurpExtension are comparing it to the libraries listed below
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆24Updated 8 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- Updated 6 years ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Updated 8 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Updated 4 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- ☆32Updated 5 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Updated 11 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 5 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- ☆11Updated 2 years ago
- Convert the loot directory of ntlmrelayx into an enum4linux like output☆22Updated 5 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆41Updated 4 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Updated 6 years ago