xscorp / BurpeeLinks
A python module that accepts an HTTP request file and returns a dictionary of headers and post data
☆44Updated 5 years ago
Alternatives and similar repositories for Burpee
Users that are interested in Burpee are comparing it to the libraries listed below
Sorting:
- ☆48Updated 4 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 4 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆37Updated last year
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆46Updated 2 years ago
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- ☆76Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- ☆148Updated 3 years ago
- ☆67Updated 6 years ago
- ☆66Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆38Updated 3 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆75Updated 5 years ago
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆103Updated 5 years ago
- XXE Injection Payloads☆28Updated 6 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆86Updated 2 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Updated 2 months ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆45Updated last year
- ☆51Updated 3 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 2 years ago
- A python library to automate time-based blind SQL injection☆50Updated 5 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆37Updated 7 years ago
- Hacked together script for feeding urls into Burp's Sitemap☆93Updated 4 months ago