xscorp / BurpeeLinks
A python module that accepts an HTTP request file and returns a dictionary of headers and post data
☆44Updated 6 years ago
Alternatives and similar repositories for Burpee
Users that are interested in Burpee are comparing it to the libraries listed below
Sorting:
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆41Updated 5 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- ☆76Updated 5 years ago
- REST API backend for Reconmap☆46Updated this week
- ☆71Updated 7 years ago
- ☆148Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆75Updated 5 years ago
- Hacked together script for feeding urls into Burp's Sitemap☆93Updated last week
- ☆48Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Workshop given at Hack in Paris 2019☆125Updated 2 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- Dump exposed HTTP .git fast☆50Updated 3 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- ☆51Updated 3 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15Updated 5 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- ☆86Updated last year
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆57Updated 5 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Updated 5 months ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35Updated last year
- A command-line tool for Cross-Site WebSocket Hijacking☆44Updated 2 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- A list of "secrets" from JWT sample code and readme files.☆57Updated 5 years ago
- ☆66Updated 4 years ago