Exemple d'extension Burp permettant d'utiliser les fichiers de configuration de proxy PAC
☆11Feb 28, 2016Updated 10 years ago
Alternatives and similar repositories for burpproxypacextension
Users that are interested in burpproxypacextension are comparing it to the libraries listed below
Sorting:
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated last month
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 4 months ago
- buddycloud static site generation and gh_pages☆18Sep 8, 2016Updated 9 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- The two official starters merged together. That's it.☆13Mar 17, 2017Updated 8 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Set up Ubuntu, Xmonad and Xmobar on Hardware, VMware or VirtualBox☆12Dec 9, 2025Updated 2 months ago
- The ronin-rb.dev website☆24Jan 12, 2026Updated last month
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Collection of scripts to p*wn mainframes☆16Sep 20, 2017Updated 8 years ago
- Hand-made Improved Nuclei Templates!🪴☆13Jun 12, 2023Updated 2 years ago
- Kali Linux Docker Container with the kali-linux-all Metapackage☆11Sep 12, 2016Updated 9 years ago
- Using OpenCV and MatLab for edge detection in the Lab colorspace☆12Feb 20, 2015Updated 11 years ago
- ☆17Jun 15, 2016Updated 9 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- ☆10Sep 5, 2022Updated 3 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- Linux kernel for imx6☆13Oct 18, 2022Updated 3 years ago
- A very basic introduction to reverse engineering (in general and for Android) as well as some useful tools (apktool, dex2jar, jd-cmd) pac…☆12Jul 21, 2020Updated 5 years ago
- easy_ipsec for ipv4 vpn relay setup☆11Dec 14, 2015Updated 10 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Perl script to bruteforce SSH known_hosts files.☆25Jun 9, 2015Updated 10 years ago
- Cobalt Strike Aggressor Script Collection☆19Mar 30, 2018Updated 7 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆18Aug 21, 2017Updated 8 years ago
- An insecure Java/Spring web application for use in DevSecOps scenarios.☆18Feb 24, 2026Updated last week
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 9 years ago
- A small and dirty Python 2 decompiler written in Python.☆13Dec 29, 2013Updated 12 years ago
- SWF decompiler and basic player☆15May 18, 2017Updated 8 years ago
- Convert gpsxml files to png files which can be opened in Qgis☆13Aug 16, 2016Updated 9 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- ☆17Oct 8, 2025Updated 4 months ago
- Resource mining and processing plugin for Kerbal Space Program.☆11Jul 6, 2022Updated 3 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- Client for the Nessus vulnerability scanner REST API.☆12Mar 20, 2020Updated 5 years ago
- ☆11May 19, 2017Updated 8 years ago