vulnbe / burpsuite-copy-as-xmlhttprequest
Copy as XMLHttpRequest BurpSuite extension
☆31Updated 4 years ago
Alternatives and similar repositories for burpsuite-copy-as-xmlhttprequest
Users that are interested in burpsuite-copy-as-xmlhttprequest are comparing it to the libraries listed below
Sorting:
- ☆35Updated 3 months ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆51Updated last year
- ☆26Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- Burp Extension that lets you use Burp Collaborator as a DNS server for exfiltrating data via Sqlmap☆36Updated 3 years ago
- public dns server list for dmut project☆18Updated last year
- client-side prototype pullution vulnerability scanner☆46Updated 3 years ago
- ☆30Updated last year
- Subdomain finder☆10Updated 2 months ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- A Burp extension to show the Collaborator client in a tab☆23Updated 2 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 2 years ago
- ☆48Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Updated 3 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- ☆19Updated 4 years ago
- ☆17Updated 2 years ago
- Extract subdomains from rapiddns.io☆23Updated 2 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 3 years ago
- ☆22Updated 3 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 4 years ago
- Noob Penetration tester☆11Updated 11 months ago
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated 11 months ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago