appsec.fyi

Tools

442 application security resources indexed across 22 tools — guides, tutorials, exploits, and reviews.

Browse by tool

Resources tagged to a specific AppSec tool — Burp Suite, sqlmap, nuclei, Frida, and others. Tools with fewer than 3 resources are not listed. The same resource can appear under multiple topics; topic tags in each row link back to the topic page.

Burp Suite portswigger.net #

241 resources across 23 topics: AI, API Sec, AuthN, AuthZ, Bug Bounty, Burp, CSRF, Deser, Fuzzing, golang, GraphQL, IDOR, JWT, Python, RCE, Recon, Secrets, SQLi, SSRF, SSTI, Talks, XSS, XXE.

DateResourceTopics
2026-04-22 2026PortSwigger Lab: Exploiting a Mass Assignment Vulnerability
PortSwigger Lab: Exploiting a Mass Assignment Vulnerability
API Sec
2026-04-22 2026GraphQL - PortSwigger Lab Writeup
GraphQL - PortSwigger Lab Writeup
Bug Bounty
2026-04-22 2026SulphurAPI: Burp Suite extension for automating OWASP API Top 10 detection
SulphurAPI: Burp Suite extension for automating OWASP API Top 10 detection
Burp
2026-04-22 2026Awesome Burp Extensions 2025
Awesome Burp Extensions 2025
Burp
2026-04-22 2026The Future of Security Testing: AI-Powered Extensibility in Burp
The Future of Security Testing: AI-Powered Extensibility in Burp
Burp
2026-04-22 2026Filtering the WebSockets history with scripts
Filtering the WebSockets history with scripts
Burp
2026-04-22 2026Filtering the HTTP history with scripts (Bambdas)
Filtering the HTTP history with scripts (Bambdas)
Burp
2026-04-22 2026Developing AI features in Burp extensions
Developing AI features in Burp extensions
Burp
2026-04-22 2026Burp AI - PortSwigger Documentation
Burp AI - PortSwigger Documentation
Burp
2026-04-22 2026Bambdas - PortSwigger Documentation
Bambdas - PortSwigger Documentation
Burp
2026-04-22 2026Hunting for IDOR and BAC in B2B Apps with Burp Authorize
Hunting for IDOR and BAC in B2B Apps with Burp Authorize
IDOR
2026-04-22 2026IDOR-Scanner: Burp Suite Extension for Automated IDOR Detection
IDOR-Scanner: Burp Suite Extension for Automated IDOR Detection
IDOR
2026-04-20 2026Meta and PortSwigger drive offensive security further to find what others miss
Meta and PortSwigger drive offensive security further to find what others miss https://ift.tt/gc5osvx
Bug Bounty
2026-04-19 2026Pentest-Mapper: Burp Extension for Pentesters & Bug Bounty
Pentest-Mapper: Burp Extension for Pentesters & Bug Bounty
Burp
2026-04-19 2026Burp Suite Extension: Copy For — Black Hills InfoSec
Burp Suite Extension: Copy For — Black Hills InfoSec
Burp
2026-04-19 2026Burp AI — PortSwigger
Burp AI — PortSwigger
Burp
2026-04-19 2026Pentest Mapper: Burp Extension for Application Pentesting
Pentest Mapper: Burp Extension for Application Pentesting
Burp
2026-04-19 2026Pentest Mapper — PortSwigger BApp Store
Pentest Mapper — PortSwigger BApp Store
Burp
2026-04-17 2026Maximizing IDOR Detection with Burp Suite's Autorize
Maximizing IDOR Detection with Burp Suite's Autorize
IDOR
2026-04-17 2026Manual and semi-automated testing for IDORs using Burp Suite
Manual and semi-automated testing for IDORs using Burp Suite
IDOR
2026-04-17 2026Testing for IDORs (PortSwigger Burp docs)
Testing for IDORs (PortSwigger Burp docs)
IDOR
2026-04-16 2026IDOR Hunting with Burp Suite: A $1,000 Bug Bounty Case Study
IDOR Hunting with Burp Suite: A $1,000 Bug Bounty Case Study
IDOR
2026-04-16 2026InQL: Advanced GraphQL Security Testing Burp Extension
InQL: Advanced GraphQL Security Testing Burp Extension
GraphQL
2026-04-16 2026Burp Suite Professional Testing Handbook
Burp Suite Professional Testing Handbook
Burp
2026-04-16 2026Bambdas Collection for Burp Suite Professional and Community
Bambdas Collection for Burp Suite Professional and Community
Burp
2026-04-16 2026BurpSuite for Pentester - Vulnerability Hunting Cheatsheet
BurpSuite for Pentester - Vulnerability Hunting Cheatsheet
Burp
2026-04-16 2026Weaponize Your Burp - Bug Bounty Hunting Automation
Weaponize Your Burp - Bug Bounty Hunting Automation
Burp
2026-04-16 2026Smart Automation with Burp Suite - YesWeHack
Smart Automation with Burp Suite - YesWeHack
Burp
2026-04-16 2026A Guide to Build Burp Suite Extensions Using Montoya API and Java
A Guide to Build Burp Suite Extensions Using Montoya API and Java
Burp
2026-04-16 2026Power Up Pen Tests: Create Burp Suite Extensions with Montoya API
Power Up Pen Tests: Create Burp Suite Extensions with Montoya API
Burp
2026-04-16 2026Burp Suite Extensions - Overview and Introduction with Kotlin
Burp Suite Extensions - Overview and Introduction with Kotlin
Burp
2026-04-16 2026Creating Burp Extensions: A Beginner's Guide - Black Hills InfoSec
Creating Burp Extensions: A Beginner's Guide - Black Hills InfoSec
Burp
2026-04-16 2026PortSwigger's Top 10 Web Hacking Techniques of 2025
PortSwigger's Top 10 Web Hacking Techniques of 2025
Bug Bounty
2026-04-14 2026Found SSRF vulnerability allowed to access admin panel and delete user account. StockAPI Burp Intruder Admin URL Deleted user account (carlos) #SSRF #WebSecurityAcademy #Portswigger #Lab #Vulnerability pic.x.com/EiIMQEUyxQ
Found SSRF vulnerability allowed to access admin panel and delete user account. StockAPI  Burp Intruder Admin URL Deleted user account (carlos) #SSRF #WebSecurityAcademy #Portswigger #Lab #Vulnerab...
SSRF
2026-04-10 2026OWASP Testing for Server Side Template Injection
OWASP Testing for Server Side Template Injection
SSTI
2026-04-10 2026Server-side template injection PortSwigger KB
Server-side template injection PortSwigger KB
SSTI
2026-04-10 2026Template Injection Research | PortSwigger Research
Template Injection Research | PortSwigger Research
SSTI
2026-04-10 2026Server-Side Template Injection | PortSwigger Research
Server-Side Template Injection | PortSwigger Research
SSTI
2026-04-10 2026Server-side template injection | Web Security Academy
Server-side template injection | Web Security Academy
SSTI
2026-04-10 2026PortSwigger KB: JWT none algorithm supported
PortSwigger KB: JWT none algorithm supported
JWT
2026-04-10 2026Working with JWTs in Burp Suite
Working with JWTs in Burp Suite
JWT
2026-04-10 2026JSON Web Token Attacker Burp extension
JSON Web Token Attacker Burp extension
JWT
2026-04-10 2026JWT Scanner Burp extension
JWT Scanner Burp extension
JWT
2026-04-10 2026PortSwigger jwt-editor: Burp Suite extension for editing and signing JWTs
PortSwigger jwt-editor: Burp Suite extension for editing and signing JWTs
JWT
2026-04-10 2026Blind SSRF with Burp Collaborator
Blind SSRF with Burp Collaborator
SSRF
2026-04-10 2026Mastering Blind SSRF Detection With Burp Suite
Mastering Blind SSRF Detection With Burp Suite
SSRF
2026-04-10 2026Testing for Blind SSRF with Burp Suite
Testing for Blind SSRF with Burp Suite
SSRF
2026-04-10 2026Uncovering Blind SSRF Using Burp Collaborator
Uncovering Blind SSRF Using Burp Collaborator
SSRF
2026-04-10 2026Burp Suite Certified Practitioner Guide 2026
Burp Suite Certified Practitioner Guide 2026
Burp
2026-04-10 2026Top 10 Burp Extensions Every Pentester Should Use
Top 10 Burp Extensions Every Pentester Should Use
Burp
2026-04-10 2026Burp AI in 2026: Real Workflow Changes
Burp AI in 2026: Real Workflow Changes
Burp
2026-04-10 2026Burp Suite Professional 2026.1 Release
Burp Suite Professional 2026.1 Release
Burp
2026-04-10 2026Burp Suite Professional 2025.5 Release
Burp Suite Professional 2025.5 Release
Burp
2026-04-10 202610 Burp Suite Extensions That Will Instantly Boost Your Work
10 Burp Suite Extensions That Will Instantly Boost Your Work
Burp
2026-04-10 2026How Burp Suite DAST Is Leveling Up Enterprise Security in 2025
How Burp Suite DAST Is Leveling Up Enterprise Security in 2025
Burp
2026-04-10 2026Burp Suite Professional 2025.2: Built-in AI Integration
Burp Suite Professional 2025.2: Built-in AI Integration
Burp
2026-04-10 2026PortSwigger Blind XXE Lab Write-up
PortSwigger Blind XXE Lab Write-up
XXE
2026-04-10 2026PortSwigger XXE Injection Writeups
PortSwigger XXE Injection Writeups
XXE
2026-04-10 2026Insecure Direct Object References (IDOR) | PortSwigger
Insecure Direct Object References (IDOR) | PortSwigger
AuthZIDOR
2026-04-10 2026100+ Burp Suite Online Courses for 2026
100+ Burp Suite Online Courses for 2026
Burp
2026-04-10 2026Burp Suite AI Extension for Pentester
Burp Suite AI Extension for Pentester
Burp
2026-04-10 2026Burp Suite Goes AI: Revolutionizing Web Pentesting
Burp Suite Goes AI: Revolutionizing Web Pentesting
Burp
2026-04-10 2026Burp Suite Integration for Neuron
Burp Suite Integration for Neuron
Burp
2026-04-10 2026The Future of Pentesting: Burp Suite + Cursor AI
The Future of Pentesting: Burp Suite + Cursor AI
Burp
2026-04-10 2026SQL Injection Tutorial & Examples - PortSwigger
SQL Injection Tutorial & Examples - PortSwigger
SQLi
2026-04-10 2026GraphQL API Vulnerabilities - PortSwigger
GraphQL API Vulnerabilities - PortSwigger
GraphQL
2026-04-06 2026Toolchain: Nmap, Burp Suite, and Metasploit - A Practical Workflow Guide
Toolchain: Nmap, Burp Suite, and Metasploit - A Practical Workflow Guide
Burp
2026-04-06 2026Top 10 Burp Suite Extensions Every Pentester Should Use
Top 10 Burp Suite Extensions Every Pentester Should Use
Burp
2026-04-03 2026Lab: SameSite Lax Bypass via Cookie Refresh | PortSwigger
Lab: SameSite Lax Bypass via Cookie Refresh | PortSwigger
CSRF
2026-04-03 2026Lab: SameSite Lax Bypass via Method Override | PortSwigger
Lab: SameSite Lax Bypass via Method Override | PortSwigger
CSRF
2026-04-03 2026Installing Extensions from BApp Store | PortSwigger
Installing Extensions from BApp Store | PortSwigger
Burp
2026-04-03 20263 Powerful Burp Suite Extensions Every Pentester Should Use
3 Powerful Burp Suite Extensions Every Pentester Should Use
Burp
2026-04-03 2026BApp Store | PortSwigger
BApp Store | PortSwigger
Burp
2026-04-03 2026Burp Suite Professional BApps: Maximizing Pentester Productivity
Burp Suite Professional BApps: Maximizing Pentester Productivity
Burp
2026-04-03 2026Burp Bounty - Scan Check Builder Extension
Burp Bounty - Scan Check Builder Extension
Burp
2026-04-03 2026Burp Suite - Top Extensions | KSEC ARK Pentesting Knowledge Base
Burp Suite - Top Extensions | KSEC ARK Pentesting Knowledge Base
Burp
2026-04-03 2026Top 10 Must-Have Burp Suite Extensions for Web Application Security (2024)
Top 10 Must-Have Burp Suite Extensions for Web Application Security (2024)
Burp
2026-04-03 2026Top 10 Pentesting Tools and Extensions in Burp Suite | PortSwigger
Top 10 Pentesting Tools and Extensions in Burp Suite | PortSwigger
Burp
2026-04-03 2026Top 20 Useful Burp Suite Extensions for Web Application Pentesting
Top 20 Useful Burp Suite Extensions for Web Application Pentesting
Burp
2026-04-03 2026Cross-Site Scripting (XSS) Cheat Sheet - 2026 Edition | PortSwigger
Cross-Site Scripting (XSS) Cheat Sheet - 2026 Edition | PortSwigger
XSS
2026-04-03 2026Access Control Vulnerabilities and Privilege Escalation | PortSwigger
Access Control Vulnerabilities and Privilege Escalation | PortSwigger
AuthZ
2026-04-03 2026Lab: Exploiting Ruby Deserialization Using a Documented Gadget Chain | PortSwigger
Lab: Exploiting Ruby Deserialization Using a Documented Gadget Chain | PortSwigger
Deser
2026-04-03 2026Exploiting Insecure Deserialization Vulnerabilities | PortSwigger
Exploiting Insecure Deserialization Vulnerabilities | PortSwigger
Deser
2026-04-03 2026API Testing with Burp Suite: A Practical Guide
API Testing with Burp Suite: A Practical Guide
API Sec
2026-04-02 2026Network Penetration Testing Tools Market Is Going to Boom |? Nessus ? Burp Suite ? Metasploit
Network Penetration Testing Tools Market Is Going to Boom |? Nessus ? Burp Suite ? Metasploit https://ift.tt/fCDeuAg
Burp
2026-02-11 2026SILENTCHAIN AI - AI-Powered Security Testing
Free AI-powered vulnerability detection for Burp Suite. Detect OWASP Top 10 with context-aware analysis.
AIBurp
2026-01-29 2026How I Made Burp Suite My IDOR-Finding Robot Butler (And Found 20+ Bugs) 🤖🔍
The content titled "How I Made Burp Suite My IDOR-Finding Robot Butler (And Found 20+ Bugs)" likely discusses utilizing the Burp Suite tool to automate the discovery of Insecure Direct Object Reference (IDOR) vulnerabilities, leading to the identification of over 20 bugs. The author shares their experience and strategies for leveraging Burp Suite effectively in bug hunting. The content may provide insights into the process of using automation tools for security testing and the successful outcomes achieved through this approach.
Bug BountyBurpIDOR
2026-01-26 2026WebHackDiaries Part 4: SSRF Just completed the SSRF labs on PortSwigger Web Security Academy. Key lesson: SSRF isnt about URLs its about broken trust boundaries. On to the next labs #WebHackDiaries #SSRF #PortSwigger #WebSecurity #BugBounty #CyberSecuripic.x.com/RgANMeoaW2aW2
The content discusses completing SSRF labs on PortSwigger Web Security Academy, emphasizing that SSRF is about broken trust boundaries, not just URLs. The focus is on learning and moving on to the next labs. Key hashtags include #WebHackDiaries, #SSRF, #PortSwigger, #WebSecurity, #BugBounty, and #CyberSecuri. The post includes a link to a picture.
SSRF
2026-01-24 2026Burp Suite | Pentest Book
Burp Suite | Pentest Book
Burp
2026-01-22 2026Testing for reflected XSS manually with Burp Suite
The content discusses how to manually test for reflected cross-site scripting (XSS) vulnerabilities using Burp Suite, a popular web application security testing tool. By utilizing Burp Suite, security professionals can identify and exploit XSS vulnerabilities in web applications to enhance their security posture. Manual testing allows for a more thorough examination of potential vulnerabilities compared to automated tools. This process involves sending crafted payloads to the application and analyzing the responses to detect any XSS vulnerabilities. By following these steps, security testers can effectively identify and mitigate XSS risks in web applications.
XSS
2026-01-21 2026Testing for stored XSS with Burp Suite
The content discusses using Burp Suite to test for stored Cross-Site Scripting (XSS) vulnerabilities. Burp Suite is a popular web application security testing tool that helps identify and exploit security issues. Stored XSS occurs when malicious scripts are stored on a website and executed when viewed by other users. By using Burp Suite, security professionals can scan web applications for stored XSS vulnerabilities, helping to identify and mitigate potential security risks. Testing for stored XSS is crucial to prevent attackers from injecting harmful scripts into websites and compromising user data.
XSS
2026-01-20 2026MantisSTS/JSReconduit: Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.
Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode. - MantisSTS/JSReconduit
BurpRecon
2026-01-19 2026Testing for SSRF with Burp Suite
The content discusses using Burp Suite, a popular web application security testing tool, to test for Server-Side Request Forgery (SSRF) vulnerabilities. SSRF allows attackers to send crafted requests from the server to other internal systems, potentially leading to data leaks or unauthorized access. Burp Suite can help identify and mitigate SSRF vulnerabilities by intercepting and modifying requests, analyzing responses, and identifying potential SSRF points of entry. By utilizing Burp Suite's features effectively, security professionals can enhance their SSRF testing capabilities and strengthen the security posture of web applications.
SSRF
2026-01-18 2026Testing for blind SSRF with Burp Suite
The content discusses using Burp Suite to test for blind Server-Side Request Forgery (SSRF). SSRF vulnerabilities allow attackers to make unauthorized requests from a server. Burp Suite, a popular web vulnerability scanner, can help identify blind SSRF by analyzing responses for indicators of SSRF attacks. Testing for blind SSRF with Burp Suite involves sending crafted requests to the target server and analyzing the responses for potential SSRF behavior. This method can help security professionals identify and mitigate SSRF vulnerabilities in web applications.
SSRF
2026-01-16 2026Included Skills: 𝐛𝐮𝐫𝐩𝐬𝐮𝐢𝐭𝐞-𝐩𝐫𝐨𝐣𝐞𝐜𝐭-𝐩𝐚𝐫𝐬𝐞𝐫 - Search/extract data from Burp Suite projects 𝐝𝐢𝐟𝐟𝐞𝐫𝐞𝐧𝐭𝐢𝐚𝐥-𝐫𝐞𝐯𝐢𝐞𝐰 - Security-focused differential review of code changes
The content discusses two included skills: searching/extracting data from Burp Suite projects and conducting a security-focused differential review of code changes. These skills are valuable for individuals involved in cybersecurity or software development. The link provided likely offers more detailed information on these skills.
Burp
2026-01-02 2026repplus/rep: rep+ — Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks
The content discusses "rep+", a tool that functions as a Burp-style HTTP Repeater for Chrome DevTools. It includes built-in AI capabilities to explain requests and recommend potential attacks. The tool aims to enhance the user's experience by providing advanced features for analyzing and manipulating HTTP requests within the Chrome browser environment.
Burp
2025-12-30 2025Teycir/BurpAPISecuritySuite: Burp Suite extension for API security testing with 15 attack types, 108+ payloads, intelligent fuzzing, BOLA/IDOR detection, AI integration, and automated reconnaissance. Supports REST/GraphQL/SOAP APIs with Nuclei, Turbo Intruder, and external tool integration. OWASP API Top 10 coverage.
Burp Suite extension for API security testing with 15 attack types, 108+ payloads, intelligent fuzzing, BOLA/IDOR detection, AI integration, and automated reconnaissance. Supports REST/GraphQL/SOAP...
API SecBurpFuzzingGraphQL
2025-12-12 2025I completed the @WebSecAcademy lab: Blind SSRF with Shellshock exploitation my first Expert-level lab! Huge thanks to @PortSwigger this one was intense and super fun. #BugBounty #SSRF #securitymindset portswigger.net/web-security/sGpic.x.com/coygKcXqSrSr
The content highlights the completion of an Expert-level lab on Blind SSRF with Shellshock exploitation by @WebSecAcademy. The individual expresses gratitude to @PortSwigger for the intense and enjoyable experience. The post includes hashtags #BugBounty, #SSRF, and #securitymindset. The link provided leads to web-security information.
SSRF
2025-12-09 2025Day 20/30 SSRF forged on @PortSwigger! Scanned internals bypassed blacklists blind exfil 2 labs owned including OOB chains. Takeaway: Never trust user-supplied URLs without validation! #SSRF #WebSecurity #PortSwiggerAcademy #BugBounty #EthicalHacking @ethivolt pic.x.com/VKIxogbRG0
Day 20/30 of SSRF testing on @PortSwigger resulted in bypassing blacklists, blind exfiltration, and owning 2 labs with OOB chains. Key takeaway: Always validate user-supplied URLs to prevent SSRF attacks. #SSRF #WebSecurity #PortSwiggerAcademy #BugBounty #EthicalHacking @ethivolt.
SSRF
2025-11-04 2025DAY 3-5/30 Deep-dive on SSRF research to strengthen real-world exploitation skills Completed 2/18 SQLi labs on @PortSwigger #BugBounty #SSRF #SQLi #WebSecurity #Infosec
The content highlights progress made on days 3-5 of a 30-day deep dive into SSRF research to enhance real-world exploitation skills. It mentions completing SQL injection labs on @PortSwigger on February 18. The focus is on bug bounty, SSRF, SQLi, web security, and infosec. The post indicates active engagement in cybersecurity research and skill development in the context of bug bounty programs.
SSRF
2025-11-03 2025Completed my first basic SSRF lab on #PortSwigger today. Used an #SSRF to make the server request http://localhost which let me reach the internal /admin #endpoint and delete a user without admin #credentials. #hacking #security
The content describes completing a basic SSRF lab on PortSwigger, utilizing SSRF to send a server request to http://localhost, accessing the internal /admin endpoint, and deleting a user without admin credentials. The post highlights the hacking and security aspects of this exercise.
SSRF
2025-11-03 2025Completed my first basic SSRF lab on #PortSwigger today. Used an #SSRF to make the server request http://localhost which let me reach the internal /admin #endpoint and delete a user without admin #credentials. #hacking #security
The content discusses completing a basic SSRF lab on PortSwigger by using SSRF to send a server request to http://localhost, accessing the internal /admin endpoint, and deleting a user without admin credentials. This demonstrates a security vulnerability that could be exploited for unauthorized actions. The post highlights the importance of understanding and securing against SSRF attacks in the context of hacking and security.
SSRF
2025-10-30 2025DAY 1/30 - SSRF learning path completed on @PortSwigger Web Security Academy. #SSRF #WebSecurity
The user completed the SSRF learning path on PortSwigger Web Security Academy on the first day of a 30-day challenge. The achievement was shared on social media with hashtags #SSRF and #WebSecurity.
SSRF
2025-09-23 2025Server leaking secrets? Thats SSRF! Conquered Intro to SSRF on @TryHackMe. Tips: 1) Tweak URL params (e.g. 127.0.0.1) for recon. 2) Use Burp Collaborator for blind SSRF. 3) Whitelist URLs. Whos next? #CyberSec #SSRF #TryHackMe
The content discusses Server-Side Request Forgery (SSRF) vulnerabilities and provides tips for exploiting them, such as manipulating URL parameters for reconnaissance, utilizing Burp Collaborator for blind SSRF attacks, and whitelisting URLs for protection. The author shares their success in mastering an "Intro to SSRF" challenge on TryHackMe and encourages others to try it. The post is tagged with #CyberSec, #SSRF, and #TryHackMe.
SSRF
2025-08-28 2025SSRF Tip: Test with payloads like or AWS . Use DNS loggers (Burp Collaborator) for blind SSRF. Prevention: whitelist domains #SSRF #BugBounty #WebSecurity #EthicalHacking
The content provides a tip for testing SSRF vulnerabilities using payloads like `http://169.254.169.254` or AWS. It suggests using DNS loggers like Burp Collaborator for blind SSRF testing. Prevention advice includes whitelisting domains. The post is related to SSRF, Bug Bounty, Web Security, and Ethical Hacking, emphasizing the importance of testing and securing against SSRF vulnerabilities.
SSRF
2025-08-14 2025Crushing bugs one lab at a time! Another PortSwigger Web Security Academy challenge SSRF with Whitelist-Based Input Filter. #CyberSecurity #PortSwigger #SSRF #WebSecurity #BugBounty #TechandAction #TechInAction
The content highlights a cybersecurity challenge from PortSwigger Web Security Academy focusing on SSRF with a Whitelist-Based Input Filter. The post emphasizes bug crushing in labs, showcasing a hands-on approach to cybersecurity. It also includes relevant hashtags like #CyberSecurity, #PortSwigger, #SSRF, #WebSecurity, #BugBounty, #TechandAction, and #TechInAction. The challenge aims to enhance skills in identifying and mitigating security vulnerabilities.
SSRF
2025-08-14 2025GitHub - asciimoo/wuzz: Interactive cli tool for HTTP inspection
The content is a brief description of a tool called "wuzz" available on GitHub. It is an interactive command-line interface tool designed for inspecting HTTP requests and responses. The tool allows users to interactively explore and analyze HTTP traffic. It is likely a useful resource for developers and individuals working with HTTP protocols to troubleshoot, debug, and understand network interactions efficiently.
2025-08-14 2025(186) @Jhaddix Talks About Defcon, Burp Suite, Hacking, Bug Bounties and Ho
The content discusses @Jhaddix's insights on Defcon, Burp Suite, hacking, bug bounties, and more in a concise manner. It likely covers topics related to cybersecurity, ethical hacking, and bug bounty programs. The content may provide valuable information and perspectives on these subjects from @Jhaddix's expertise.
Talks
2025-08-14 2025Top 10 web hacking techniques of 2022 | PortSwigger Research
The content is about the top 10 web hacking techniques of 2022 as researched by PortSwigger. It likely delves into the latest methods and strategies used by hackers to exploit vulnerabilities in web systems. This information can be valuable for cybersecurity professionals, developers, and organizations to understand current threats and enhance their defenses against cyber attacks.
Bug Bounty
2025-08-14 2025d0ge/sign-saboteur: SignSaboteur is a Burp Suite extension for editing, sig
"SignSaboteur" is a Burp Suite extension called d0ge/sign-saboteur that allows for editing and modifying signatures.
Burp
2025-08-14 2025254Labs/awesome-bambdas: A collection of Burp Suite Lambda Filters ~ Bambda
254Labs/awesome-bambdas is a repository that contains a collection of Burp Suite Lambda Filters known as Bambda. These filters are designed to enhance the functionality of Burp Suite, a popular web application security testing tool. The repository likely offers a variety of Lambda Filters that can be used to customize and improve the performance of Burp Suite during security assessments and testing.
Burp
2025-08-14 2025Burp Extension Dev Part 4: GUI Design - TCM Security
The content discusses the fourth part of developing a Burp extension, focusing on GUI design and TCM Security. It likely delves into creating a graphical user interface for the extension and incorporating security considerations related to TCM (Threat and Countermeasure) Security. The article may provide insights on how to design a user-friendly interface for the extension while ensuring that security measures are implemented to address potential threats.
Burp
2025-08-14 2025GitHub - federicodotta/Burp-Suite-Extender-Montoya-Course: This repository
The content is a brief description of a GitHub repository named "Burp-Suite-Extender-Montoya-Course" created by user federicodotta. The repository likely contains resources related to extending the capabilities of Burp Suite, a popular web application security testing tool. It appears to be a course or collection of materials curated by the user for educational purposes.
Burp
2025-08-14 2025GitHub - dwisiswant0/ngocok: ngrok Collaborator Link — yet another Burp Col
The content refers to a GitHub repository named dwisiswant0/ngocok, which involves ngrok collaborator link for Burp Suite. The repository seems to offer a tool or script related to ngrok and Burp Suite integration.
Burp
2025-08-14 2025Burp Extension Dev Part 1: Setup & Basics - TCM Security
The content titled "Burp Extension Dev Part 1: Setup & Basics - TCM Security" likely provides guidance on setting up and understanding the basics of developing Burp extensions, a popular tool for web security testing. It is part of a series by TCM Security, a company specializing in cybersecurity. The content may cover essential steps and foundational knowledge required for developing Burp extensions, serving as a starting point for individuals interested in enhancing the capabilities of this tool for security testing purposes.
Burp
2025-08-14 2025Writing Burp Bambda Filters Like a Boss
The content appears to be a title stating "Writing Burp Bambda Filters Like a Boss." It suggests that the focus is on mastering the skill of writing Burp Bambda filters effectively. The title implies that the content will likely provide guidance or tips on how to excel in creating these filters with expertise and confidence.
Burp
2025-08-14 2025synfron/ReshaperForBurp
The content is a reference to a tool called "synfron/ReshaperForBurp." It appears to be a software tool or plugin, likely designed for use with the Burp Suite, a popular web application security testing tool. The tool may offer features to enhance or modify the functionality of Burp Suite, potentially aiding in security testing, vulnerability assessment, or other related tasks. The content is concise and does not provide detailed information about the tool's specific features or capabilities.
Burp
2025-08-14 2025Improve your API Security Testing with Burp BCheck Scripts
The content emphasizes enhancing API security testing by utilizing Burp BCheck Scripts. These scripts can be beneficial in identifying vulnerabilities and ensuring the security of APIs. By incorporating these scripts into the testing process, users can enhance the effectiveness and efficiency of their API security assessments.
Burp
2025-08-14 2025DNS Analyzer - Finding DNS vulnerabilities with Burp Suite - SEC Consult
The content discusses using the DNS Analyzer tool in Burp Suite to identify vulnerabilities in DNS configurations. Developed by SEC Consult, this tool helps security professionals assess and strengthen DNS security by detecting weaknesses that could be exploited by attackers. By leveraging Burp Suite's capabilities, users can analyze DNS settings, identify potential vulnerabilities, and take proactive measures to enhance the security of their DNS infrastructure.
Burp
2025-08-14 20257 Essential Burp Extensions for Hacking APIs - Security Boulevard
The content discusses seven essential Burp extensions for hacking APIs, focusing on enhancing security measures. These extensions are crucial tools for identifying vulnerabilities and ensuring the safety of APIs. By utilizing these extensions, security professionals can effectively test and secure APIs against potential threats and attacks. The article emphasizes the importance of using these tools to enhance the security posture of API implementations.
Burp
2025-08-14 2025Burp Suite: The Basics TryHackMe Writeup
The content is about a writeup on using Burp Suite for basic tasks on TryHackMe. Burp Suite is a popular web application testing tool used for security assessments. The writeup likely covers introductory information, tutorials, and practical exercises related to using Burp Suite in a simulated hacking environment provided by TryHackMe. This content is likely to provide insights into how to use Burp Suite effectively for testing and securing web applications.
Burp
2025-08-14 2025https://github.com/lucsemassa/burp_bug_finder
The provided link leads to a GitHub repository named "burp_bug_finder" created by user lucsemassa. The content of the repository likely contains tools or scripts related to finding bugs in the Burp Suite software. For more detailed information, it is recommended to visit the GitHub link directly.
Burp
2025-08-14 2025Vulnerabilities detected by Burp Scanner - PortSwigger
The content provided is a title mentioning vulnerabilities detected by Burp Scanner, a web vulnerability scanner developed by PortSwigger. It suggests that the focus is on identifying security weaknesses in web applications through the use of this tool. The summary lacks detailed information about specific vulnerabilities or how they are detected, but it highlights the importance of using tools like Burp Scanner to enhance the security of web applications.
Burp
2025-08-14 2025botesjuan/Burp-Suite-Certified-Practitioner-Exam-Study
The content appears to be a study guide or resource related to preparing for the Burp Suite Certified Practitioner Exam. It seems to be created by a user named botesjuan. The content likely includes information, tips, and resources to help individuals study and prepare for the certification exam.
Burp
2025-08-14 2025xnl-h4ck3r/GAP-Burp-Extension
The content is a reference to a GitHub repository named "xnl-h4ck3r/GAP-Burp-Extension." This suggests that the repository contains a Burp extension developed by the user xnl-h4ck3r. Burp extensions are typically used to enhance the functionality of the Burp Suite, a popular web application security testing tool. The extension likely provides additional features or capabilities to assist in security testing and analysis.
Burp
2025-08-14 2025nccgroup/AutoRepeater: Automated HTTP Request Repeating With Burp Suite
The content is about a tool called nccgroup/AutoRepeater, which automates the process of repeating HTTP requests using Burp Suite. This tool assists in testing and analyzing web applications by automatically repeating specific HTTP requests. It aims to streamline the process of testing and identifying vulnerabilities in web applications by automating repetitive tasks within the Burp Suite environment.
Burp
2025-08-14 2025My First Burp Suite Extension
The content is titled "My First Burp Suite Extension" and simply states that the author has created their first Burp Suite extension. The content is very brief and does not provide any further details or information about the extension or its functionality.
Burp
2025-08-14 2025The Top 8 Burp Suite Extensions - Think outside the box
The content briefly mentions the top 8 Burp Suite extensions, encouraging users to think creatively and explore beyond the standard features of the tool. It suggests that by utilizing these extensions, users can enhance their security testing capabilities and discover new ways to improve their testing processes. The emphasis is on expanding one's toolkit and considering innovative approaches to maximize the benefits of using Burp Suite.
Burp
2025-08-14 2025Open Security Research: Extending Burp Proxy With Extensions
The content discusses open security research focused on extending Burp Proxy with extensions. It likely explores the development and implementation of additional functionalities or features within Burp Proxy to enhance its capabilities for security testing and analysis. The article may delve into the benefits, methods, and potential outcomes of extending Burp Proxy through the use of extensions, aiming to provide insights and guidance for security researchers and professionals seeking to optimize their security testing tools.
Burp
2025-08-14 2025PortSwigger Web Security Blog: Writing your first Burp Suite extension
The content is about a blog post on PortSwigger Web Security that guides readers on how to write their first Burp Suite extension. It likely provides step-by-step instructions, tips, and best practices for creating custom extensions to enhance the functionality of Burp Suite, a popular web security testing tool. The blog post may cover topics such as setting up the development environment, understanding the extension architecture, and writing code to extend the capabilities of Burp Suite. It aims to help users customize their security testing workflows and improve their web application security assessments.
Burp
2025-08-14 2025Web App Pentesting With Burp Suite Scan Profiles | White Oak
The content provided lacks specific information or details to summarize. It seems to mention web application pentesting using Burp Suite scan profiles in White Oak, but without further context or details, a concise summary cannot be provided.
Burp
2025-08-14 2025https://portswigger.net/blog/some-of-the-best-burp-extensions-as-chosen-by-you
The blog discusses some of the best Burp Suite extensions chosen by users. It highlights popular extensions like Autorize, Collaborator Everywhere, and Backslash Powered Scanner. These extensions enhance Burp Suite's functionality by adding features such as automated authorization testing, improved collaboration capabilities, and advanced scanning functionalities. Users appreciate these extensions for their effectiveness in improving security testing workflows and identifying vulnerabilities. The blog aims to showcase the diverse range of extensions available for Burp Suite users to enhance their experience and maximize the tool's capabilities for web security testing.
Burp
2025-08-14 2025Great getting started resources for new users of Burp Suite Professional |
The content mentions that there are excellent resources available for new users of Burp Suite Professional. It suggests that these resources are helpful for beginners looking to get started with using the software effectively. The content seems to emphasize the availability of resources to assist new users in learning how to use Burp Suite Professional.
Burp
2025-08-14 2025https://www.whiteoaksecurity.com/web-app-pentesting-burp-suite-scan-profile/
The content discusses how to perform web application penetration testing using Burp Suite's scan profiles. It explains the importance of scan profiles in customizing and optimizing scans for different types of web applications. The article provides a step-by-step guide on creating and configuring scan profiles in Burp Suite to enhance the efficiency and effectiveness of web application security testing. It emphasizes the significance of understanding scan profiles to tailor scans to specific testing requirements and improve the overall testing process.
Burp
2025-08-14 2025Authentication Token Obtain and Replace (ATOR) Burp Plugin: Fast and Reliab
The content is about the Authentication Token Obtain and Replace (ATOR) Burp Plugin, which is described as fast and reliable. It likely focuses on a tool or extension that aids in obtaining and replacing authentication tokens within the Burp Suite software. The plugin is designed to streamline the process of managing authentication tokens, enhancing efficiency and reliability in security testing and web application assessments.
Burp
2025-08-14 2025BurpSuite Extensions: Some Favorites - VDA Labs
The content titled "BurpSuite Extensions: Some Favorites - VDA Labs" likely discusses various favorite BurpSuite extensions recommended by VDA Labs. BurpSuite is a popular web vulnerability scanner and testing tool used by cybersecurity professionals. VDA Labs may share insights on specific extensions that enhance the functionality and capabilities of BurpSuite for security testing purposes. The article could provide valuable recommendations for users looking to optimize their experience with BurpSuite through the use of extensions vetted by VDA Labs.
Burp
2025-08-14 2025Burp Share Requests - PortSwigger
The content is concise and mentions "Burp Share Requests" by PortSwigger. This likely refers to a feature or tool related to sharing HTTP requests in Burp Suite, a popular web application security testing tool. The feature may allow users to easily share and collaborate on HTTP requests within the Burp Suite platform.
Burp
2025-08-14 2025https://www.infosecurity-magazine.com/news/portswigger-launches-web-security/
PortSwigger has introduced a new web security product called Burp Suite Enterprise Edition. It aims to enhance web application security testing for organizations by offering scalable and collaborative features. The tool enables multiple users to work together on security testing projects, improving efficiency and collaboration. Burp Suite Enterprise Edition provides a centralized platform for managing testing activities, sharing results, and tracking progress. This product is designed to streamline the process of identifying and addressing security vulnerabilities in web applications, helping organizations strengthen their cybersecurity defenses.
Burp
2025-08-14 2025https://github.com/snoopysecurity/awesome-burp-extensions
The provided link leads to a GitHub repository named "awesome-burp-extensions" created by snoopysecurity. This repository likely contains a curated list of useful extensions for Burp Suite, a popular web application security testing tool. Users can explore and access various Burp extensions shared in this repository to enhance their security testing capabilities.
Burp
2025-08-14 2025Using Burp to Test a REST API | Burp Suite Support Center
The content is about utilizing Burp Suite to test a REST API. Burp Suite is a popular tool used for web application security testing. Testing REST APIs with Burp Suite can help identify vulnerabilities and ensure the security of the API. By using Burp Suite, testers can intercept and analyze API requests and responses, manipulate data, and detect potential security issues. This tool provides various features to assist in testing and securing REST APIs effectively.
Burp
2025-08-14 2025https://www.kitploit.com/2018/11/aes-killer-v30-burp-plugin-to-decrypt.html?utm_source=dlvr.it&utm_medium=twitter&m=1
The content discusses AES Killer v3.0, a Burp Suite plugin designed to decrypt AES encrypted traffic in real-time. It allows security professionals to analyze encrypted traffic and identify potential vulnerabilities. The plugin can be used to decrypt HTTPS traffic and view the plaintext data for security testing purposes. This tool enhances the capabilities of Burp Suite for security researchers and penetration testers.
Burp
2025-08-14 2025PortSwigger/param-miner
The content provided is a brief mention of a tool called PortSwigger/param-miner. This tool is likely related to web security testing or web application security, as PortSwigger is known for its web security tools like Burp Suite. However, without additional context or details, it is unclear what specific functionality or purpose the PortSwigger/param-miner tool serves.
Burp
2025-08-14 2025GitHub - nccgroup/BurpSuiteHTTPSmuggler: A Burp Suite extension to help pen
The content is about a GitHub repository named "BurpSuiteHTTPSmuggler" created by nccgroup. It is a Burp Suite extension designed to assist in penetration testing. The extension likely provides tools and functionalities to help identify and exploit HTTP smuggling vulnerabilities during security assessments using the Burp Suite tool.
Burp
2025-08-14 2025The Top 5 Burp Suite Extensions
The content mentions the top 5 Burp Suite extensions. Burp Suite is a popular web vulnerability scanner used by security professionals for testing web applications. Extensions enhance its functionality by adding new features and capabilities. The top 5 extensions likely provide additional tools for security testing, automation, or customization within the Burp Suite environment.
Burp
2025-08-14 2025SleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Po
SleuthQL is a Burp Suite tool designed for parsing history to uncover potential SQL injection vulnerabilities. It aids in identifying security flaws related to SQL injection by analyzing Burp's history.
Burp
2025-08-14 2025https://portswigger.net/web-security/sql-injection/cheat-sheet
The provided link leads to a cheat sheet on SQL injection from PortSwigger, a web security resource. The cheat sheet likely contains valuable information on SQL injection techniques, syntax, and examples to help individuals understand and prevent SQL injection attacks. It serves as a quick reference guide for developers and security professionals to enhance their knowledge and protect web applications from this common vulnerability.
SQLi
2025-08-14 2025https://www.hackingarticles.in/burp-suite-for-pentester-hackbar/
The content discusses the use of Burp Suite, a popular tool for penetration testing, and specifically focuses on the Hackbar extension. Hackbar is a simple penetration testing tool that allows users to execute JavaScript code in the browser. The article provides a detailed guide on how to install and use Hackbar within Burp Suite for various testing scenarios. It emphasizes the importance of understanding the tool's capabilities and limitations to effectively utilize it in security assessments. Overall, the content highlights the practical application of Hackbar in enhancing the functionality of Burp Suite for penetration testing purposes.
BurpXSSXXE
2025-08-14 2025https://portswigger.net/web-security/xxe
The link provided leads to a webpage discussing XML External Entity (XXE) attacks in web security. XXE attacks exploit vulnerabilities in XML parsers to access sensitive data or execute remote code. The article likely covers how XXE attacks work, their impact on web applications, and strategies to prevent them, such as disabling external entity processing or using secure XML parsers. It's important for web developers and security professionals to be aware of XXE vulnerabilities and take necessary precautions to protect their systems from potential exploitation.
XXE
2025-08-14 2025br3akp0int/GQLParser: A repository for GraphQL Extension for Burp Suite
The content is about a repository called br3akp0int/GQLParser, which offers a GraphQL Extension for Burp Suite. This extension likely provides additional functionality for the Burp Suite tool related to handling GraphQL requests and responses. The repository may contain code, documentation, or resources for integrating GraphQL capabilities into the Burp Suite tool for security testing and analysis purposes.
GraphQL
2025-08-14 2025https://portswigger.net/research/our-favourite-community-contributions-to-the-xss-cheat-sheet
The content discusses the XSS Cheat Sheet, highlighting community contributions that enhance the resource. The XSS Cheat Sheet is a valuable reference for understanding cross-site scripting vulnerabilities. The article showcases various user-generated additions to the cheat sheet, such as new payloads, evasion techniques, and attack vectors. These contributions help improve the cheat sheet's comprehensiveness and usefulness for security professionals and developers. The article emphasizes the collaborative nature of the cybersecurity community in sharing knowledge and best practices to combat XSS vulnerabilities effectively.
XSS
2025-08-14 2025Documenting the impossible: Unexploitable XSS labs | PortSwigger Research
The content is about "Unexploitable XSS labs" by PortSwigger Research. It likely discusses the challenges of documenting and dealing with XSS vulnerabilities that are deemed unexploitable. The article may explore the complexities of identifying and mitigating XSS flaws that are difficult to exploit, highlighting the importance of thorough documentation and research in cybersecurity practices.
XSS
2025-08-14 2025(509) Find and Exploit Server-Side Request Forgery (SSRF) Using Burp Suite
The content is about utilizing Burp Suite to discover and exploit Server-Side Request Forgery (SSRF) vulnerabilities. SSRF allows attackers to make requests on behalf of the server, potentially accessing sensitive data or services. Burp Suite, a popular web vulnerability scanner, can help identify SSRF vulnerabilities in web applications, enabling security professionals to address and mitigate these risks. By understanding how SSRF works and using tools like Burp Suite, security experts can enhance the protection of web applications against potential exploits.
SSRF
2025-08-14 2025Server-Side Request Forgery (SSRF)- PortSwigger Labs | by Michael Koczwara
The content is about Server-Side Request Forgery (SSRF) and is part of PortSwigger Labs. It likely discusses the concept of SSRF, which is a type of vulnerability that allows attackers to manipulate server requests from the server side. The article may cover how SSRF attacks work, their impact on security, and potential mitigation strategies. It is written by Michael Koczwara and is likely to provide insights and guidance on understanding and addressing SSRF vulnerabilities in web applications.
SSRF
2025-07-12 2025Blind SSRF via Burp Collaborator 1 App fetches URLs (PDF gen webhook etc.) 2 Send URL pointing to Burp Collaborator 3 No visible response but OAST logs the request 4 Confirms SSRF vulnerability No output no bug #bugbounty #ssrf #burp #oast
The content discusses a method for exploiting a Blind SSRF vulnerability using Burp Collaborator. It involves sending URLs to Burp Collaborator through an application that fetches URLs like PDF generation or webhooks. Despite no visible response, the Out-of-Band Application Security Testing (OAST) logs the request, confirming the SSRF vulnerability. The key takeaway is that even if there is no visible output, the presence of an SSRF vulnerability should not be overlooked. This information is relevant for bug bounty hunters and those interested in web security testing.
SSRF
2025-06-28 2025Server-Side Bugs That Pay Big SSRF (internal request abuse) SSTI (template injection) XXE (XML Entity Injection) Log4Shell-style payloads Blind bugs with Burp Collaborator Quiet bugs massive impact. #BugBounty #SSRF #EthicalHacking #bugbountytip
The content discusses lucrative server-side bugs like SSRF, SSTI, XXE, Log4Shell-style payloads, and blind bugs with Burp Collaborator. These vulnerabilities can have a significant impact and are valuable for bug bounty programs and ethical hacking. Emphasizing the importance of identifying and addressing these issues, the post highlights their potential for exploitation and the need for vigilance in cybersecurity.
SSRF
2025-05-08 2025Completed Server-Side Vulnerabilities Learning Path at PortSwigger Thrilled to finish PortSwigger's Server-Side Vulnerabilities path gaining insight into web system exploits. #WebSecurity #CyberSec #PortSwigger #Learning #SQLInjection #SSRF #Auth #Vulns
The content highlights the completion of the Server-Side Vulnerabilities Learning Path at PortSwigger, expressing excitement at gaining insights into web system exploits like SQL injection, SSRF, and authentication vulnerabilities. The individual is thrilled to finish the learning path and shares hashtags related to web security, cybersecurity, learning, and PortSwigger.
SSRF
2025-04-30 2025#burp #pentest #ai #hackerassociate #cybersecurity #infosec… | Harshad Shah
Setting Up #Burp MCP Server on Claude Desktop #Pentest Modern App with #Ai ⇢ Learn how to set up a 𝗕𝘂𝗿𝗽 𝗠𝗖𝗣 𝗦𝗲𝗿𝘃𝗲𝗿 on your 𝗖𝗹𝗮𝘂𝗱𝗲 𝗱𝗲𝘀𝗸𝘁𝗼𝗽 in this easy-to-follow tutorial. ⇢ Get your server up and...
AIBurpTalks
2025-04-03 2025Sticky Burp, Reusable and Replaceable Environment Variables
Enables persistent sticky session handling in web application testing.
Burp
2025-03-10 2025GitHub - vsec7/BurpSuite-Xkeys: A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage. - vsec7/BurpSuite-Xkeys
BurpSecrets
2025-03-08 2025GitHub - trufflesecurity/trufflehog-burp-suite-extension: Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc) using TruffleHog.
Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc) using TruffleHog. - trufflesecurity/trufflehog-burp-suite-...
BurpSecrets
2025-02-05 2025SSRF: Anatomy of a Cloud Attack @ Cloud Village | @seasides_conf 2025! Join @Zero0x00 as he explores SSRF attacks with Burp Suite & AWS Metadata. A must-attend for cloud security pros! 22 Feb 2025 #CloudSecurity #SSRF #Seasides2025
The content discusses an upcoming session at the Cloud Village event at the Seasides Conference 2025, focusing on SSRF attacks using Burp Suite and AWS Metadata. Led by @Zero0x00, the session is aimed at cloud security professionals and is scheduled for February 22, 2025. It emphasizes the importance of understanding SSRF attacks in cloud security. Attendees are encouraged to join to gain insights into this critical aspect of cloud security.
SSRF
2025-02-03 2025Nowy odcinek na YouTube! Jak działa SSRF (Server-Side Request Forgery) i jak atakujący mogą manipulować żądaniami HTTP? Sprawdź jak wykrywać i testować tę podatność! Obejrzyj teraz: #SSRF #Cybersecurity #BurpSuite #Pentesting #WebSecurity
The content discusses a new YouTube episode about SSRF (Server-Side Request Forgery), explaining how attackers manipulate HTTP requests and how to detect and test this vulnerability. It invites viewers to watch the episode to learn more about SSRF, cybersecurity, BurpSuite, pentesting, and web security. The link provided directs viewers to the YouTube video.
SSRF
2025-02-01 2025Looking for a Burp Collaborator alternative for SSRF testing? Bug bounty hunters & pentesters Interactsh is a must-have for SSRF exploitation web security and bug bounties. #BugBounty #PenetrationTesting #SSRF #HackingTools #ProjectDiscovery
Interactsh is recommended as a Burp Collaborator alternative for SSRF testing by bug bounty hunters and pentesters. It is considered essential for SSRF exploitation, web security, and bug bounties. The tool is highlighted for its effectiveness in these areas and is associated with Bug Bounty, Penetration Testing, SSRF, Hacking Tools, and Project Discovery.
SSRF
2025-02-01 2025A Burpsuite Extension For JS Reconnaissance - Jsmon
The Jsmon Burpsuite extension is designed for security researchers to enhance their web security testing by integrating Jsmon's javascript scanning and monitoring capabilities directly into Burpsuite....
BurpRecon
2025-01-30 2025BChecks - IntelliJ IDEs Plugin | Marketplace
Provides support for the BCheck language, used to provide custom scan checks for Burp Suite Professional and Burp Suite Enterprise. Key features: Syntax highlighting...
Burp
2025-01-28 2025GitHub - IckoGZ/burp-deepseek: A quick and dirty (and a little shitty) burp extension that uses cheap deepseek api to send request and response and maybe found something interesting.
A quick and dirty (and a little shitty) burp extension that uses cheap deepseek api to send request and response and maybe found something interesting. - IckoGZ/burp-deepseek
Burp
2025-01-15 2025Blind #SSRF vulnerabilities can be detected by monitoring response times & using out-of-band techniques like DNS/HTTP callbacks. Set up a Burp Collaborator or interactsh server to catch those internal network calls. #InfoSec #BugBounty #WebSecurity
Blind SSRF vulnerabilities can be identified by monitoring response times and utilizing out-of-band techniques like DNS/HTTP callbacks. Setting up a Burp Collaborator or interactsh server can help capture internal network calls. This approach enhances information security, aids in bug bounty programs, and strengthens web security measures.
SSRF
2025-01-12 2025Quick and dirty way to find parameters vulnerable to LFI & Path Traversal & SSRF & Open Redirect: Burp Search Regex \?.=(\/\/?\w|\w\/|\w(%3A|:)(\/|%2F)|%2F|[\.\w]\.\w{24}[\w]) And find potentially vulnerable SSRF params - https://t.co/6cfBPVn0FM #SSRF #cybersec https://t.co/ipnHHHaID4
The content discusses a method using Burp Search Regex to identify parameters vulnerable to LFI, Path Traversal, SSRF, and Open Redirect. The provided regex pattern helps in finding potentially vulnerable SSRF parameters. The focus is on cybersecurity, specifically SSRF vulnerabilities. The content includes a link for further reference.
SSRF
2025-01-09 2025Automated SSRF Detection! #BugBounty #SSRF #Regex #bugbountytips #burpsuite Prepare for success: 1 Use a DNS log platform (e.g. Burp Collaborator or https://t.co/UiHRbhDCC8). 2 Ready these regex patterns:
The content discusses automated SSRF detection for bug bounty programs, emphasizing the use of a DNS log platform like Burp Collaborator and specific regex patterns. It suggests preparing for success by utilizing these tools and resources to enhance SSRF vulnerability detection. The post also includes relevant hashtags and a link to regex patterns for reference.
SSRF
2024-12-31 2024GitHub - hackerassociate/SSRF-Hacks-IP-Decimal: A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad Shah.
The content discusses a Burp Suite extension named "SSRF-Hacks-IP-Decimal" created by Harshad Shah. This tool converts IP addresses to decimal notation, aiding in SSRF bypass and WAF evasion testing. It is available on GitHub under the hackerassociate repository. The extension is designed to assist in security testing by converting IP addresses for specific testing scenarios.
BurpSSRF
2024-12-16 2024socalledhacker: Don't want to use Burpsuite collaborator for SSRF hunting... Check this out an amazing replacement of collaborator:- #bugbounty #bug #bugbountytip #bugbountytips @cybersecurity #infosec #SSRF
The content shared by socalledhacker discusses an alternative to using Burpsuite collaborator for SSRF hunting. The post highlights a replacement tool and encourages users to explore it. The hashtags used indicate the focus on bug bounty, cybersecurity, infosec, and SSRF. The post is shared on Twitter by socalledhacker.
SSRF
2024-12-12 2024API Testing with Insomnia and Burp Suite: An Alternative to Postman
Learn how to use Insomnia and Burp Suite for API testing and hacking as a powerful alternative to Postman. Set up Insomnia, capture API requests with mitmproxy, convert them to OpenAPI 3.0 format, and...
API SecBurp
2024-12-03 2024burp-extensions-montoya-api-examples/customlogger/src/main/java/example/customlogger/MyTableModel.java at main · PortSwigger/burp-extensions-montoya-api-examples
Examples for using the Montoya API with Burp Suite - PortSwigger/burp-extensions-montoya-api-examples
Burp
2024-12-03 2024Hacking API discovery with a custom Burp extension
Learn how to improve your API discovery with a custom Burp Suite extension dedicated to automatically finding API document artifacts for you.
API SecBurp
2024-12-03 2024Burp-Montoya-Utilities/src/main/java/com/coreyd97/BurpExtenderUtilities/PopOutPanel.java at master · CoreyD97/Burp-Montoya-Utilities
The content refers to a repository named "Burp-Montoya-Utilities" containing a Java file called "PopOutPanel.java" by CoreyD97. It offers utilities for creating extensions using Burp's Montoya API. This repository is a resource for developers looking to enhance Burp Suite functionality.
Burp
2024-11-25 2024burp-extensions-montoya-api-examples/collaborator/src/main/java/example/collaborator/CollaboratorExample.java at main · PortSwigger/burp-extensions-montoya-api-examples · GitHub
Examples for using the Montoya API with Burp Suite - PortSwigger/burp-extensions-montoya-api-examples
Burp
2024-11-25 2024burp-extensions-montoya-api-examples/customscanchecks/src/main/java/example/customscanchecks/MyScanCheck.java at main · PortSwigger/burp-extensions-montoya-api-examples · GitHub
Examples for using the Montoya API with Burp Suite - PortSwigger/burp-extensions-montoya-api-examples
Burp
2024-11-19 2024Joyerz5: Just Discovered a Cool SSRF!! Now working to make it Impactful!! Any tips guys? How I Found it? On the Image Upload features there was fetch image from URL guess what? Yes I put burp collaborator Link there and got HTTP DNS response back! It is confirm now! #ssrf #bugbounty
The content describes a cybersecurity enthusiast, Joyerz5, who discovered a Server-Side Request Forgery (SSRF) vulnerability while testing an image upload feature. By inserting a Burp Collaborator link, they received an HTTP DNS response, confirming the SSRF. Joyerz5 is now seeking tips to maximize the impact of this finding, indicating involvement in bug bounty programs. The post highlights the importance of identifying and exploiting vulnerabilities like SSRF for security testing and rewards.
SSRF
2024-10-05 2024Mindmap/Burp Suite/Burp Suite Normal.png at main · Ignitetechnologies/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them - Ignitetechnologies/Mindmap
Burp
2024-10-03 2024Automate your API hacking with Autorize
Learn how to find authorization and authentication vulnerabilities in APIs using Burp and Autorize.
API SecAuthNAuthZ
2024-10-03 2024Top 10 Browser Extensions Every Bug Bounty Hunter Needs
As bug bounty hunters, we need to save time by avoiding constant switching between the terminal, multiple tabs, Burp Suite (including…
Bug BountyBurp
2024-09-21 2024Proving API exploitability with Burp Collaborator
Learn how to prove API exploitability through the use of the Burp Collaborator for out-of-band application security testing (OAST).
API SecBurp
2024-09-16 2024PyCript: Burp Suite extension that allows for bypassing client-side encryption
Pycript is a Burp Suite extension that enables users to encrypt and decrypt requests for manual and automated application penetration testing.
BurpPython
2024-09-04 2024@SandroBruscino: Learn how attackers bypass URL validation in SSRF attacks! PortSwigger's latest cheat sheet reveals key techniques. "Understanding these flaws is critical for defending web apps." #CyberSecurity #SSRF #WebSecurity
The content discusses how attackers bypass URL validation in SSRF attacks, with PortSwigger's cheat sheet revealing key techniques. Understanding these flaws is crucial for defending web apps. The post emphasizes the importance of cybersecurity, SSRF, and web security. Sandro Bruscino's tweet highlights the significance of recognizing and preventing vulnerabilities in web applications to enhance cybersecurity measures.
SSRF
2024-08-30 2024GitHub - e1abrador/Burp-Encode-IP: Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.
Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist. - e1abrador/Burp-Encode-IP
Burp
2024-08-22 2024BChecks/vulnerability-classes/injection at main · PortSwigger/BChecks · GitHub
BChecks collection for Burp Suite Professional and Burp Suite Enterprise Edition - PortSwigger/BChecks
BurpRCESQLiXSS
2024-08-16 2024Rajan22m: I completed the Web Security Academy lab: SSRF with blacklist-based input filter @WebSecAcademy #portswigger #websecurity #lab #hacking #ethicalhacker #ethicalhacking #bug #bugbountytips #ssrf #server
Rajan22m completed the Web Security Academy lab on SSRF with a blacklist-based input filter. The post includes hashtags related to web security, hacking, ethical hacking, bug bounty tips, SSRF, and servers. The completion of this lab likely signifies Rajan22m's progress and expertise in web security and ethical hacking.
SSRF
2024-08-16 2024GitHub - 0x999-x/jsluicepp: jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic using the CLI tool jsluice
jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic using the CLI tool jsluice - 0x999-x/jsluicepp
Burp
2024-08-14 2024basu_banakar: Thread On: Testing for Blind/Non-Blind SSRFs using redirection in integrations where there are some filters. #bugbountytips #BugBounty #ssrf #bugbountytips 1. Hit the integration by using burp collaborator by using random credentials.
The content discusses testing for Blind/Non-Blind SSRFs using redirection in integrations with filters. The suggestion is to test by hitting the integration with Burp collaborator using random credentials. The post is shared on Twitter by basu_banakar. The focus is on bug bounty tips related to SSRF vulnerabilities.
SSRF
2024-08-03 2024Testing Handbook - Burp
Watch the recording Testing Handbook: Burp Suite Professional https://appsec.guide
BurpTalks
2024-08-03 2024Mastering Web Research with Burp Suite
Mastering Web Research with Burp Suite
Burp
2024-08-03 2024Beyond the Limit: Expanding single-packet race condition with a first sequence sync for breaking the 65,535 byte limit
Introduction Hello, I’m RyotaK (@ryotkak ), a security engineer at Flatt Security Inc. In 2023, James Kettle of PortSwigger published an excellent paper titled Smashing the state machine: the true pot...
Fuzzing
2024-08-02 2024GitHub - synacktiv/HopLa: HopLa Burp Suite Extender plugin - Adds autocompletion support and useful payloads in Burp Suite
The GitHub repository "synacktiv/HopLa" offers the HopLa Burp Suite Extender plugin, enhancing Burp Suite with autocompletion support and useful payloads. This tool is designed to improve efficiency and effectiveness when testing web applications for security vulnerabilities.
Burp
2024-07-31 2024Extending Burp Suite for fun and profit - The Montoya way - Part 5 - hn security
Setting up the environment + Hello […]
Burp
2024-07-30 2024Here's how I get the most out of Burp Suite reporting
Learn how to get the most out of the reporting capabilities built into PortSwigger's Burp Suite Professional.
Burp
2024-07-30 2024JS Link Finder Burp Suite Extension Guide
Improve your bug bounty hunting, pentesting, and appsec skills with the JS Link Finder Burp Suite Extension. Discover hidden endpoints and…
Bug BountyBurp
2023-12-06 2023videos[1] = "GAP Burp Extension"
videos[1] = "GAP Burp Extension" https://www.youtube.com/watch?v=Os3bN0zUROA
Burp
2023-11-03 2023Burp Suite Shorts | Automatic Session Handling
The content is a video titled "Burp Suite Shorts | Automatic Session Handling" available on YouTube. It likely provides a concise tutorial or demonstration on how to utilize automatic session handling within the Burp Suite tool. This feature can streamline the process of managing and maintaining sessions during security testing and web application assessments. Viewers can expect to learn how to automate session handling tasks to enhance efficiency and effectiveness in their security testing workflows.
AuthNBurp
2023-11-03 2023Burp Suite Shorts | Automatic Session Handling
Burp Suite Shorts | Automatic Session Handling https://www.youtube.com/watch?v=yoENNJjC4NY
AuthNBurp
2023-10-29 2023PortSwigger/BChecks: BChecks collection for Burp Suite Professional
BChecks collection for Burp Suite Professional . Contribute to PortSwigger/BChecks development by creating an account on GitHub.
Burp
2023-10-13 2023Understanding File Upload Vulnerabilities in Web App Penetration Testing | 2023
Understanding File Upload Vulnerabilities in Web App Penetration Testing | 2023 https://ift.tt/8aVoHYJ
RCE
2023-09-15 2023burp.IBurpExtenderCallbacks java code examples
burp.IBurpExtenderCallbacks java code examples https://ift.tt/je1FMoP
Burp
2023-09-03 2023Proxying Burp Traffic through VPS using SOCKS Proxy
Tunnel your BurpSuite traffic through VPS to bypass restrictions using SOCKS proxy.
Burp
2023-08-13 2023Swing in Python Burp Extensions - Part 1
The content discusses using Swing in Python for developing Burp extensions. It is part 1 of a series and provides insights into integrating Swing, a GUI toolkit, with Python to create user interfaces for Burp Suite extensions. The article likely covers the basics of Swing, its benefits for creating interactive interfaces, and how it can be utilized within the context of Burp Suite extension development.
BurpPython
2023-08-03 2023Proxying MetaSploit through BurpSuite
Proxying MetaSploit through BurpSuite https://ift.tt/ZHsxq1m
Burp
2023-07-02 2023DNS Analyzer - Finding DNS vulnerabilities with Burp Suite
DNS Analyzer - Finding DNS vulnerabilities with Burp Suite https://ift.tt/a9OyrE2
BurpRecon
2023-06-17 2023Web Application Hacking with Burp Suite
Web Application Hacking with Burp Suite https://ift.tt/I6xB4Cg
Burp
2023-05-29 2023RepeaterSearch
RepeaterSearch https://ift.tt/oKX6Ysp
Burp
2023-04-13 2023How to use Burp Suite Like a PRO?
How to use Burp Suite Like a PRO? https://ift.tt/fbstnRg
Burp
2023-04-09 2023aress31/burpgpt
aress31/burpgpt https://ift.tt/mzKofw7
AIBurp
2023-02-17 2023Burp Suite Extensions Rarely Utilized but Quite Useful
The content discusses the underutilization of Burp Suite extensions despite their usefulness. It highlights that these extensions can enhance the functionality of Burp Suite, aiding in various security testing tasks. The article likely delves into the benefits of utilizing these extensions, such as improving efficiency, expanding capabilities, and enhancing the overall experience of using Burp Suite for security testing purposes. Overall, it emphasizes the value of exploring and incorporating these extensions into one's workflow to maximize the potential of Burp Suite.
Burp
2023-02-16 2023A Step-by-Step Guide to Writing Extensions for API Pentesting in BurpSuite
The content provides a detailed guide on creating extensions for API pentesting in BurpSuite. It likely covers step-by-step instructions on how to develop custom tools or scripts to enhance API security testing within the BurpSuite platform. This guide can help users understand the process of extending BurpSuite's capabilities for API pentesting, potentially improving their testing efficiency and effectiveness.
Burp
2022-10-13 2022Server-Side Request Forgery (SSRF)- PortSwigger Labs
The content discusses Server-Side Request Forgery (SSRF) as presented by PortSwigger Labs. SSRF is a vulnerability that allows attackers to manipulate a server into making requests on their behalf. This can lead to unauthorized access to internal systems, data theft, or server exploitation. Understanding SSRF is crucial for developers and security professionals to prevent such attacks and secure their systems. The link provided likely offers further details or resources on SSRF from PortSwigger Labs.
SSRF
2022-06-20 2022Favorite tweet by @Burp_Suite
Favorite tweet: Burp Suite 2022.6 released to the Early Adopter channel. Includes grouped tabs for Repeater, connection reuse for HTTP/1 requests, and new preset scan modes. Also introduces the abili...
BurpXSS
2022-06-20 2022Favorite tweet by @PortSwigger
Favorite tweet: Finding Client-Side Prototype Pollution (CSPP) with DOM Invader by @garethheyes - now available on the Early Adopter channel https://t.co/ut1Buup1so — PortSwigger (@PortSwigger) Jun ...
Burp
2022-04-20 2022Favorite tweet by @Jhaddix
Favorite tweet: Asking for a friend: What's the current best low-cost, self-study, Burp Suite training out there? — Jason Haddix (@Jhaddix) Apr 19, 2022
Burp
2022-04-14 2022Favorite tweet by @e11i0t_4lders0n
Favorite tweet: Burp Extension for XSS Thread 🧵 #bugbounty #bugbountytip #bugbountytips — Tushar Verma 🇮🇳 (@e11i0t_4lders0n) Apr 14, 2022
Bug BountyBurpXSS
2022-03-21 2022Favorite tweet by @cedoxX
Favorite tweet: Nuclei-Burp-Plugin - A @Burp_Suite plugin intended to help with Nuclei template generation. https://t.co/wseZPcgBE0 @KitPloit #RedTeam #Tools #Cyber #Hacker #BugBounty #Hacking https:...
Burp
2022-03-06 2022Favorite tweet by @fardeenahmed411
Favorite tweet: Top 10 essential tools for Bug-Bounty Hunting : 1. Burp Suite / ZAP-Proxy 2. Google Dorking Script 3. DNS-Discovery 4. Reverse IP Lookup 5. Wapiti 6. INalyzer 7. IronWASP 8. Wfuzz 9. ...
Bug BountyBurpRecon
2022-03-02 2022Favorite tweet by @ptracesecurity
Favorite tweet: Nuclei-Burp Extension: run nuclei scanner directly from burp https://t.co/5eXxgjapf7 #Pentesting #BurpSuite #WebSecurity #Infosec https://t.co/xwhsoQfhRo — Ptrace Security GmbH (@ptr...
Burp
2022-01-05 20220xInfection/XSRFProbe
0xInfection/XSRFProbe
CSRF
2022-01-03 2022BUG BOUNTY HUNTING WITH BURP SUITE
BUG BOUNTY HUNTING WITH BURP SUITE
Bug BountyBurp
2021-11-22 2021Burp Suite for Pentester: Software Vulnerability Scanner & Retire.js
Burp Suite for Pentester: Software Vulnerability Scanner & Retire.js
Burp
2021-10-29 2021Improvements to Burp Suite authenticated scanning
Improvements to Burp Suite authenticated scanning
AuthZBurp
2021-08-30 2021Web App Pentesting With Burp Suite Scan Profiles | White Oak
The content discusses the importance of efficient web application pentesting using Burp Suite's Config Library and scan profiles. It highlights how these tools can enhance the testing process and improve results. White Oak Security's blog emphasizes the significance of utilizing scan profiles to streamline the testing procedure and maximize the effectiveness of the pentesting tool.
Burp
2021-08-30 2021Web App Pentesting With Burp Suite Scan Profiles
The content focuses on web application penetration testing using Burp Suite scan profiles. Burp Suite is a popular tool for assessing web application security. Scan profiles in Burp Suite help customize and optimize the scanning process for different types of vulnerabilities. By utilizing scan profiles effectively, security professionals can efficiently identify and address security issues in web applications.
Burp
2021-08-25 2021Burp Suite for Pentester: Repeater
Burp Suite for Pentester: Repeater
Burp
2021-08-21 2021Why u should use burp to test Path Traversal Vulnerability and also get RXSS
Why u should use burp to test Path Traversal Vulnerability and also get RXSS
BurpXSS
2021-06-05 2021Automating Burp Suite -4 | Understanding And Customising Custom Header From
The content discusses the creation of a Burp Extension using Jython to automate Burp Suite tasks. Specifically, it focuses on adding custom headers to requests. This is the fourth tutorial in the series, emphasizing understanding and customizing custom headers. The tutorial likely provides step-by-step instructions on how to implement this feature within Burp Suite for automated testing and customization purposes.
Burp
2021-04-22 2021Web App Pentesting With Burp Suite Scan Profiles | White Oak
The blog by White Oak Security discusses efficient web application pentesting using Burp Suite's Config Library and scan profiles. It highlights the importance of using these tools to enhance testing capabilities. By utilizing scan profiles, testers can streamline their processes and improve the effectiveness of their assessments. The blog emphasizes the significance of proper tool utilization in enhancing the overall testing experience and outcomes.
Burp
2020-12-03 2020My First Burp Suite Extension
The content discusses the author's transition from defensive to offensive security roles, requiring new skill development. They introduce their first Burp Suite extension, a tool for testing web applications. Burp Suite is highlighted as a valuable security tool.
Burp
2020-05-30 2020BurpSuite Extensions: Some Favorites - VDA Labs
The content mentions a list of favorite BurpSuite extensions curated by VDA Labs. It likely discusses various useful extensions that can enhance the functionality of BurpSuite, a popular web application security testing tool. The article may provide insights into specific extensions that can improve the efficiency and effectiveness of security testing processes within BurpSuite.
Burp
2020-02-25 2020doyensec/graph-ql: GraphQL Security Research Material
The content refers to a GitHub repository called doyensec/inql, which is an extension for the Burp Suite tool designed for testing the security of GraphQL APIs. The tool, named InQL, is specifically created for conducting security assessments on GraphQL endpoints. It aims to assist in identifying and addressing potential security vulnerabilities in GraphQL implementations.
GraphQL
2019-11-14 2019PortSwigger Launches Web Security Academy
PortSwigger has introduced the Web Security Academy to address the shortage of cybersecurity skills. The platform, created by the makers of Burp Suite, offers interactive training to enhance web security knowledge. This initiative aims to equip individuals with the necessary skills to combat cyber threats effectively.
Burp
2019-08-23 2019How i exploit out-of-band resource load (HTTP) using burp suite extension plugin (taborator)
The content discusses exploiting out-of-band resource load using a Burp Suite extension plugin called Taborator. It focuses on the background of the issue, likely related to leveraging HTTP requests to manipulate or extract data from a target system. The use of Burp Suite, a popular web vulnerability scanner, in combination with the Taborator plugin suggests a method for identifying and potentially exploiting vulnerabilities related to out-of-band resource loading. This technique could be used for security testing and identifying weaknesses in web applications.
Burp
2019-03-10 2019The Top 5 Burp Suite Extensions
The content provided is very brief and lacks information on the top 5 Burp Suite extensions. It only mentions the location of the developer and author, who is based in Austin, TX. The main point is that the author is associated with Burp Suite extensions, but specific details about the extensions themselves are missing.
Burp
2018-11-08 2018AES-Killer v3.0 - Burp Plugin To Decrypt AES Encrypted Traffic Of Mobile Apps On The Fly
AES-Killer v3.0 is a Burp plugin designed to decrypt AES encrypted traffic from mobile apps in real-time. This tool allows for the decryption of encrypted data on the fly, aiding in the analysis of mobile app traffic for security testing and debugging purposes.
Burp
2018-06-08 2018SleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Po
SleuthQL is a tool designed to parse Burp history and identify potential SQL injection points. It aims to assist in discovering vulnerabilities related to SQL injection by analyzing requests and responses within Burp Suite. This tool is useful for security professionals and researchers looking to enhance their testing capabilities and identify potential weaknesses in web applications.
Burp
2017-03-07 2017PortSwigger Web Security Blog: Adapting AngularJS Payloads to Exploit Real
The PortSwigger Web Security Blog discusses the challenges of exploiting AngularJS Template Injection in XSS attacks. Experienced pentesters face obstacles like filtering, encoding, browser quirks, and WAFs. Adapting AngularJS payloads to bypass these defenses is crucial for successful exploitation.
XSS
2017-03-07 2017PortSwigger Web Security Blog: XSS without HTML: Client-Side Template Injec
The PortSwigger Web Security Blog discusses how the widespread use of AngularJS can lead to Angular Template Injection vulnerabilities on websites. This issue is a less recognized form of server-side template injection. The blog highlights the risks associated with naive implementation of AngularJS, emphasizing the importance of understanding and mitigating such vulnerabilities to protect websites from exploitation.
XSS
2016-12-28 2016The Top 8 Burp Suite Extensions - Think outside the box
The content is a title mentioning the top 8 Burp Suite extensions and encourages thinking outside the box when using these tools. It suggests that these extensions can enhance the functionality of Burp Suite, a popular web application security testing tool. The focus is on exploring innovative ways to utilize these extensions to improve security testing processes.
Burp

sqlmap sqlmap.org #

47 resources across 9 topics: AI, Bug Bounty, Fuzzing, GraphQL, Mobile, Python, RCE, SQLi, Talks.

DateResourceTopics
2026-04-22 2026SQLMap Tamper Collection: Modern WAF Bypass Scripts (Cloudflare, AWS, Azure)
SQLMap Tamper Collection: Modern WAF Bypass Scripts (Cloudflare, AWS, Azure)
SQLi
2026-04-22 2026Pentesting PostgreSQL with SQL Injections
Pentesting PostgreSQL with SQL Injections
SQLi
2026-04-22 2026CVE-2025-52694 PoC: Critical SQL Injection in Advantech IoTSuite/SaaS-Composer
CVE-2025-52694 PoC: Critical SQL Injection in Advantech IoTSuite/SaaS-Composer
SQLi
2026-04-22 2026MCP Vulnerability Case Study: SQL Injection in the Postgres MCP Server
MCP Vulnerability Case Study: SQL Injection in the Postgres MCP Server
SQLi
2026-04-22 2026BWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL Injections
BWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL Injections
SQLi
2026-04-17 2026Discovering GraphQL endpoints and SQLi vulnerabilities
Discovering GraphQL endpoints and SQLi vulnerabilities
GraphQL
2026-04-17 2026HackerOne Report #435066: SQL injection in GraphQL endpoint
HackerOne Report #435066: SQL injection in GraphQL endpoint
GraphQL
2026-04-16 2026SQLMap Cheat Sheet: Commands, Options, and Advanced Features
SQLMap Cheat Sheet: Commands, Options, and Advanced Features
SQLi
2026-04-15 2026SAP Security Patch Day April 2026: Critical Vulnerabilities CVSS 9.9 SQL Injection and Authorization Risks
SAP Security Patch Day April 2026: Critical Vulnerabilities, CVSS 9.9 SQL Injection, and Authorization Risks https://erp.today/sap-security-patch-day-april-2026-vulnerabilities/
SQLi
2026-04-15 2026FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion
FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion https://ift.tt/ENselVr
SQLi
2026-04-14 2026CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks
CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks https://ift.tt/HrQnkXP
SQLi
2026-04-14 2026SAP Patch Day Fixes Critical SQL Injection DoS and Code Injection Flaws
SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws https://ift.tt/wOQTGjW
SQLi
2026-04-14 2026SAP Patch Day Fixes Critical SQL Injection DoS and Code Injection Flaws
SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws https://ift.tt/lgQwt4L
SQLi
2026-04-14 2026CISA Warns of Fortinet SQL Injection Flaw Actively Exploited in Attacks
CISA Warns of Fortinet SQL Injection Flaw Actively Exploited in Attacks https://ift.tt/kN2acMA
SQLi
2026-04-14 2026CISA Warns Fortinet SQL Injection Flaw Is Being Actively Exploited
CISA Warns Fortinet SQL Injection Flaw Is Being Actively Exploited https://ift.tt/3sSd5jK
SQLi
2026-04-14 2026SAP Patch Day Fixes Critical SQL Injection DoS and Code Injection Flaws
SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws https://ift.tt/QS2AJx7
SQLi
2026-04-11 2026400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw
400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw https://ift.tt/IQKLFnZ
SQLi
2026-04-11 2026SQL injection vulnerabilities in Owncloud Android app
SQL injection vulnerabilities in Owncloud Android app
Mobile
2026-04-10 2026SQL Injection in 2026: It Took One Apostrophe
SQL Injection in 2026: It Took One Apostrophe
SQLi
2026-04-10 2026Advanced SQL Injection Techniques in Modern Web Apps
Advanced SQL Injection Techniques in Modern Web Apps
SQLi
2026-04-10 2026Bypassing WAF with Adversarial SQL
Bypassing WAF with Adversarial SQL
SQLi
2026-04-10 2026WAF Bypass Using JSON-Based SQL Injection Attacks
WAF Bypass Using JSON-Based SQL Injection Attacks
SQLi
2026-04-10 2026SQL Injection Security Vulnerabilities
SQL Injection Security Vulnerabilities
SQLi
2026-04-10 2026CVE Search: SQL Injection
CVE Search: SQL Injection
SQLi
2026-04-10 2026SQL Injection - OWASP
SQL Injection - OWASP
SQLi
2026-04-10 2026CVE-2026-26116: SQL Server SQL Injection
CVE-2026-26116: SQL Server SQL Injection
SQLi
2026-04-09 2026Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks
Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks https://ift.tt/3WzZLD8
AI
2026-04-09 2026Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation Attacks
Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation Attacks https://ift.tt/7D4rhpX
SQLi
2026-04-09 2026Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation
Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation https://ift.tt/fMHBmC1
SQLi
2026-04-09 2026Multiple SonicWall Flaws Enable SQL Injection and Privilege Escalation Attacks
Multiple SonicWall Flaws Enable SQL Injection and Privilege Escalation Attacks https://ift.tt/IWwTAuM
SQLi
2026-04-06 2026Bug Bounty Bootcamp #29: Boolean Blind SQL Injection Part 2
Bug Bounty Bootcamp #29: Boolean Blind SQL Injection Part 2
SQLi
2025-08-14 2025https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/
The content discusses website penetration testing and database hacking using SQLmap. It covers the importance of penetration testing to identify vulnerabilities, the process of using SQLmap for database hacking, and steps to perform SQL injection attacks. The article emphasizes the ethical use of these techniques for security testing and highlights the risks associated with unauthorized hacking. It provides insights into the tools and methods used in penetration testing and database hacking, aiming to enhance cybersecurity awareness and skills.
Bug Bounty
2025-08-14 2025https://vavkamil.cz/2019/10/09/understanding-the-full-potential-of-sqlmap-during-bug-bounty-hunting/
The content discusses maximizing the potential of SQLmap during bug bounty hunting. It covers the importance of understanding SQL injection vulnerabilities, using SQLmap effectively, and customizing its options for better results. The article emphasizes the significance of proper reconnaissance, parameter identification, and evasion techniques to enhance the success rate of SQL injection attacks. It also provides insights into exploiting blind SQL injection vulnerabilities and leveraging SQLmap's advanced features to automate the detection and exploitation process. Overall, the content aims to help bug bounty hunters utilize SQLmap efficiently for discovering and exploiting SQL injection vulnerabilities.
Bug BountySQLi
2024-11-13 2024SQLMap Command Generator
SQLMap Command Generator
SQLi
2023-09-22 2023How to turn SQL injection into an RCE or a file read? Case study of 128 bug bounty reports
How to turn SQL injection into an RCE or a file read? Case study of 128 bug bounty reports https://www.youtube.com/watch?v=ClnVdYf4PK0
RCETalks
2023-06-08 2023Test website for SQL injection vulnerabilities using Python
Test website for SQL injection vulnerabilities using Python https://ift.tt/msKlYeM
Python
2022-04-09 2022Favorite tweet by @Jhaddix
Favorite tweet: 4/8/22 #bugbountydiary #bugbountytips Everyone is sick in the house but I had some running scans I needed to check up on. I found a SQL injection bug on a blog. Here's how I did it, s...
Bug Bounty
2022-01-16 2022How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes
How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes
FuzzingSQLi
2021-04-16 2021DVWA 1.9+: Blind SQL Injection with SQLMap
The content discusses performing Blind SQL Injection on DVWA 1.9+ using SQLMap. It follows a previous article on manual SQL Injection with OWASP ZAP. The focus is on hacking DVWA through Blind SQL Injection techniques.
SQLi
2021-01-23 2021https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/
The content discusses website penetration testing and database hacking using a tool called SQLMap. It covers the process of identifying vulnerabilities in websites, exploiting them to gain unauthorized access to databases, and extracting sensitive information. The article provides a step-by-step guide on how to perform these tasks using SQLMap, a popular tool for automated SQL injection and database takeover. It emphasizes the importance of ethical hacking practices and the need for organizations to secure their websites and databases against potential cyber threats.
SQLi
2020-04-17 2020SQL Injection Cheat Sheet by Netsparker
The SQL Injection Cheat Sheet by Netsparker is a comprehensive guide detailing various forms of the SQL injection vulnerability. It serves as a valuable technical resource for understanding and addressing SQLi risks effectively.
SQLi
2019-12-29 2019https://medium.com/bugbountywriteup/sql-injection-time-and-boolean-based-27239b6a55e8?source=twitterShare-1764222123d3-1576594710&_referrer=twitter&_branch_match_id=732557985002302401
The content discusses SQL injection vulnerabilities, specifically focusing on time-based and boolean-based techniques. It explains how attackers can exploit these vulnerabilities to manipulate database queries and gain unauthorized access to sensitive information. The article likely provides examples, explanations, and possibly mitigation strategies for preventing SQL injection attacks.
SQLi
2019-11-17 2019Understanding the full potential of sqlmap during bug bounty hunting
The content discusses utilizing sqlmap, a tool for detecting and exploiting SQL injection vulnerabilities, in bug bounty hunting and ethical hacking for offensive website security. It emphasizes understanding the full potential of sqlmap to effectively identify and exploit vulnerabilities. The focus is on leveraging this tool to enhance security testing efforts and maximize the outcomes of bug bounty programs.
Bug BountySQLi
2019-10-05 2019SQL injection to RCE
The content discusses a case of SQL injection leading to Remote Code Execution (RCE) discovered during a recent customer penetration testing exercise. The author will detail the scenario in the following lines.
RCESQLi
2018-07-29 2018Making a Blind SQL Injection a Little Less Blind
The content discusses the author's experience finding a SQL Injection bug despite the belief that manual SQL Injections are no longer common. The author aims to shed light on this issue and shares insights on how to make a Blind SQL Injection less challenging.
SQLi
2018-07-19 2018Comprehensive Guide to Sqlmap (Target Options)
The article discusses the "target commands" in sqlmap, a tool for SQL injection attacks. These commands are used to specify the target website or application for the attack. Understanding and utilizing these commands effectively is crucial for successful SQL injection testing.
SQLi
2018-01-11 2018SQL Injection Wiki
The SQL Injection Wiki is a comprehensive resource for understanding, exploiting, and escalating SQL injection vulnerabilities in different Database Management Systems. It serves as a valuable tool for individuals looking to learn more about SQL injection attacks and how to effectively exploit them.
SQLi

nuclei github.com/projectdiscovery #

18 resources across 7 topics: API Sec, Bug Bounty, Fuzzing, Recon, SQLi, SSRF, XSS.

DateResourceTopics
2026-04-17 2026Recon-Script: automation with Nuclei (s1d6point7bugcrowd)
Recon-Script: automation with Nuclei (s1d6point7bugcrowd)
Recon
2026-04-17 2026The Ultimate Guide to Finding Bugs With Nuclei (ProjectDiscovery)
The Ultimate Guide to Finding Bugs With Nuclei (ProjectDiscovery)
Recon
2026-04-17 2026Automate Your Nuclei Recon Pipeline with VPN + Discord Alerts
Automate Your Nuclei Recon Pipeline with VPN + Discord Alerts
Recon
2026-04-16 2026From Recon to Sensitive Key Exposure Using Nuclei
From Recon to Sensitive Key Exposure Using Nuclei
Recon
2026-04-16 2026Automating Bug Bounties with Nuclei
Automating Bug Bounties with Nuclei
Bug Bounty
2026-04-16 2026Advanced Techniques & Use Cases of Nuclei for Bug Bounty
Advanced Techniques & Use Cases of Nuclei for Bug Bounty
Bug Bounty
2025-08-14 2025NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open
NucleiFuzzer is an automation tool designed to detect vulnerabilities like XSS, SQLi, SSRF, and Open. It is powerful and efficient in identifying these security issues.
FuzzingSQLiSSRFXSS
2025-08-14 2025NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open
"NucleiFuzzer is an automation tool designed to detect vulnerabilities like XSS, SQLi, SSRF, and Open. It offers powerful capabilities for automated security testing."
SSRF
2025-05-22 2025New CVE : CVE-2025-4123 Grafana open redirect XSS/SSRF via path traversal Detect it now with Nuclei template #infosec #cve #nuclei #grafana #ssrf #xss #openredirect
A new CVE, CVE-2025-4123, highlights a vulnerability in Grafana that allows open redirect, XSS, and SSRF via path traversal. The issue can be detected using Nuclei template. The post emphasizes the importance of addressing this security concern in Grafana. #infosec #cve #nuclei #grafana #ssrf #xss #openredirect.
SSRF
2024-09-26 2024Simplifying XSS Detection with Nuclei - A New Approach
XSS (Cross-Site Scripting) detection has long been a challenge, balancing accuracy with avoiding excessive false positives. Traditionally, this meant creating specific reflection based string matchers...
XSS
2024-09-18 2024Cybersleuth254: Found an SSRF vulnerability using a custom Nuclei template! This bug allows attackers to inject malicious URLs and access sensitive data on the server. #Cybersecurity #SSRF #BugBounty #PenTesting #Infosec #Nuclei
Cybersleuth254 discovered an SSRF vulnerability using a custom Nuclei template, enabling attackers to inject malicious URLs and access sensitive server data. The finding highlights the importance of cybersecurity measures like bug bounties, penetration testing, and information security. #Cybersecurity #SSRF #BugBounty #PenTesting #Infosec #Nuclei.
SSRF
2024-09-18 2024Cybersleuth254: Found an SSRF vulnerability using a custom Nuclei template! This bug allows attackers to inject malicious URLs and access sensitive data on the server. Always validate inputs to prevent these threats! #Cybersecurity #SSRF #BugBounty #PenTesting #Infosec #Nuclei
Cybersleuth254 discovered an SSRF vulnerability using a custom Nuclei template, enabling attackers to inject malicious URLs and access sensitive server data. The importance of input validation to prevent such threats is emphasized. The post highlights cybersecurity, SSRF, bug bounty, penetration testing, and Nuclei.
SSRF
2023-08-11 2023The Ultimate Guide to Finding Bugs With Nuclei
The Ultimate Guide to Finding Bugs With Nuclei https://ift.tt/0ODZ7up
Bug Bounty
2022-03-02 2022Favorite tweet by @ptracesecurity
Favorite tweet: Nuclei-Burp Extension: run nuclei scanner directly from burp https://t.co/5eXxgjapf7 #Pentesting #BurpSuite #WebSecurity #Infosec https://t.co/xwhsoQfhRo — Ptrace Security GmbH (@ptr...
Recon
2022-01-10 2022Nuclei Templates
Nuclei Templates
FuzzingRecon
2022-01-10 2022Install Nuclei
Install Nuclei
FuzzingRecon
2021-12-01 2021DevSecOps part 3: Scanning Live Web Applications with Nuclei
DevSecOps part 3: Scanning Live Web Applications with Nuclei
API SecRecon
2021-11-24 2021Install Nuclei
Install Nuclei
Bug BountyRecon

OWASP ZAP zaproxy.org #

16 resources across 9 topics: AI, API Sec, AuthZ, Bug Bounty, Deser, IDOR, JWT, Talks, XSS.

DateResourceTopics
2026-04-11 2026OWASP Top 10 for LLMs 2025: Key Risks and Mitigation Strategies
OWASP Top 10 for LLMs 2025: Key Risks and Mitigation Strategies
AI
2026-04-10 2026OWASP WSTG: Testing JSON Web Tokens
OWASP WSTG: Testing JSON Web Tokens
JWT
2026-04-10 2026BLA9:2025 Broken Access Control - OWASP
BLA9:2025 Broken Access Control - OWASP
AuthZ
2026-04-10 2026OWASP A01: Broken Access Control Risks and Prevention
OWASP A01: Broken Access Control Risks and Prevention
AuthZ
2026-04-10 2026OWASP-TOP-10 A01:2025 Broken Access Control
OWASP-TOP-10 A01:2025 Broken Access Control
AuthZ
2026-04-10 2026IDOR - OWASP Foundation
IDOR - OWASP Foundation
IDOR
2026-04-03 2026Insecure Deserialization | OWASP
Insecure Deserialization | OWASP
Deser
2026-01-09 2026OWASP CRS Vulnerability Enables Charset Validation Bypass
The content discusses a vulnerability in the OWASP CRS (Core Rule Set) that allows attackers to bypass charset validation. This vulnerability could potentially be exploited by malicious actors to evade security measures and launch attacks. It highlights the importance of addressing and patching vulnerabilities promptly to enhance cybersecurity defenses and protect systems from potential threats.
XSS
2026-01-09 2026OWASP CRS Vulnerability Allows Attackers to Bypass Charset Validation
The OWASP CRS vulnerability enables attackers to bypass charset validation, as reported on cyberpress.org. This vulnerability poses a security risk by allowing malicious actors to circumvent charset validation measures. Organizations using OWASP CRS should be aware of this issue and take necessary steps to mitigate the vulnerability to prevent potential attacks.
XSS
2025-08-14 2025OWASP Videos
The content is concise and simply states "OWASP Videos," indicating that there are videos related to the Open Web Application Security Project (OWASP). OWASP is a non-profit organization focused on improving software security. The videos likely cover various topics related to web application security, such as best practices, vulnerabilities, and tools. Viewers can expect educational content on how to secure web applications and prevent security breaches.
Talks
2025-08-14 2025XSS (Cross Site Scripting) Prevention Cheat Sheet - OWASP
The content is a XSS (Cross Site Scripting) Prevention Cheat Sheet provided by the Open Web Application Security Project (OWASP). It likely contains guidelines, best practices, and techniques to prevent XSS attacks on web applications. OWASP is a well-known organization that focuses on improving the security of software. The cheat sheet is a concise resource that developers can refer to for preventing XSS vulnerabilities in their web applications.
XSS
2024-09-23 2024Sec_Mind_Maps/OWASP API TOP 10.pdf at main · h0tak88r/Sec_Mind_Maps
cyber security mind maps collection. Contribute to h0tak88r/Sec_Mind_Maps development by creating an account on GitHub.
API Sec
2024-07-22 2024DOM Based XSS | OWASP Foundation
DOM Based XSS on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.
XSS
2022-02-27 2022Favorite tweet by @ZAProxyCon
Favorite tweet: You're invited to #ZAPCon 2022! ⚡️ Whether you are just getting started, or have a decade of experience with ZAP, ZAPCon will level-up your AppSec skills. 100% Virtual. 100% Free! 🎟️ ...
Bug BountyTalks
2022-01-19 2022ZAPCon
ZAPCon
Bug BountyTalks
2020-01-31 2020OWASP Videos
The OWASP Foundation hosts videos on its website to educate about software security. OWASP is a nonprofit organization dedicated to enhancing software security.
Talks

TruffleHog github.com/trufflesecurity #

14 resources across 3 topics: Bug Bounty, Secrets, Supply Chain.

DateResourceTopics
2026-04-19 2026Shai-Hulud: A Persistent Secret Leaking Campaign — GitGuardian
Shai-Hulud: A Persistent Secret Leaking Campaign — GitGuardian
Supply Chain
2026-04-17 2026TruffleHog: Deep Dive on Secret Management (Jit)
TruffleHog: Deep Dive on Secret Management (Jit)
Secrets
2026-04-17 2026TruffleHog Open Source v3 vs GitGuardian
TruffleHog Open Source v3 vs GitGuardian
Secrets
2026-04-17 2026git-secret-scanner: Find secrets with TruffleHog & Gitleaks
git-secret-scanner: Find secrets with TruffleHog & Gitleaks
Secrets
2026-04-17 2026Gitleaks vs TruffleHog 2026 Benchmarks (AppSec Santa)
Gitleaks vs TruffleHog 2026 Benchmarks (AppSec Santa)
Secrets
2026-04-17 2026Rafter: detect-secrets vs gitleaks vs TruffleHog
Rafter: detect-secrets vs gitleaks vs TruffleHog
Secrets
2026-04-11 2026How TruffleHog Verifies Secrets
How TruffleHog Verifies Secrets
Secrets
2026-04-10 2026Secret Scanner Comparison: Finding Your Best Tool
Secret Scanner Comparison: Finding Your Best Tool
Secrets
2026-04-10 20266 Effective Secret Scanning Tools
6 Effective Secret Scanning Tools
Secrets
2026-04-10 20268 Best Secret Scanning Tools (2026)
8 Best Secret Scanning Tools (2026)
Secrets
2026-04-10 2026Best Secret Scanning Tools in 2025
Best Secret Scanning Tools in 2025
Secrets
2026-04-03 2026TruffleHog - Find, Verify, and Analyze Leaked Credentials
TruffleHog - Find, Verify, and Analyze Leaked Credentials
Secrets
2022-03-17 2022Favorite tweet by @0x1shu
Favorite tweet: 🧙‍♂️Git Secrets Leaks Simplified by @sec_r0 ✨ In this flyer, you'll learn about how git works and the reason behind the git secrets leaks. Download the flyer: https://t.co/zMruBpl6c4 ...
Bug Bounty
2021-09-20 2021TruffleHog The Chrome Extension
TruffleHog The Chrome Extension
Secrets

amass github.com/owasp-amass #

12 resources across 2 topics: Bug Bounty, Recon.

DateResourceTopics
2026-04-17 2026Complete Guide to Amass Tool (2025 Edition)
Complete Guide to Amass Tool (2025 Edition)
Recon
2026-04-10 2026Amass Cheat Sheet: 70+ Commands for Recon & Bug Bounty
Amass Cheat Sheet: 70+ Commands for Recon & Bug Bounty
Recon
2026-04-06 2026Using OWASP Amass with Netlas Module
Using OWASP Amass with Netlas Module
Recon
2026-04-03 2026How to Use Amass for Subdomain Enumeration and Recon Like a Pro
How to Use Amass for Subdomain Enumeration and Recon Like a Pro
Recon
2025-08-14 2025amass — Automated Attack Surface Mapping | Daniel Miessler
The content appears to be a brief mention of "amass" by Daniel Miessler, a tool for Automated Attack Surface Mapping. It seems to be a tool or project related to cybersecurity and mapping out potential vulnerabilities in a system or network. The summary lacks specific details or insights about the tool's features or functionality.
Bug Bounty
2021-10-28 2021Haklukes Guide to AmassHow to Use Amass More Effectively for Bug Bounties
Haklukes Guide to AmassHow to Use Amass More Effectively for Bug Bounties
Bug BountyRecon
2021-10-28 2021OWASP Amass - An Extensive Tutorial
OWASP Amass - An Extensive Tutorial
Recon
2021-10-28 2021Amass/config.ini at master OWASP/Amass
Amass/config.ini at master OWASP/Amass
Recon
2021-10-28 2021OWASP Amass - Users' Guide
OWASP Amass - Users' Guide
Recon
2021-10-28 2021OWASP/Amass
OWASP/Amass
Recon
2021-10-28 2021How to Use OWASP Amass: An Extensive Tutorial
How to Use OWASP Amass: An Extensive Tutorial
Recon
2019-11-12 2019amass — Automated Attack Surface Mapping | Daniel Miessler
The content discusses amass, an automated attack surface mapping tool, providing a tutorial on its functionality and real-world examples for common OSINT (Open Source Intelligence) scenarios. The tutorial likely covers how to use amass to gather information about potential attack surfaces and demonstrates its practical application in cybersecurity investigations.
Bug Bounty

Frida frida.re #

12 resources across 1 topic: Mobile.

DateResourceTopics
2026-04-22 2026Reverse engineering and modifying Android apps with JADX and Frida
Reverse engineering and modifying Android apps with JADX and Frida
Mobile
2026-04-22 2026Bypassing iOS Frida Detection with LLDB and Frida
Bypassing iOS Frida Detection with LLDB and Frida
Mobile
2026-04-22 2026frida-interception-and-unpinning: Scripts to MitM all HTTPS traffic
frida-interception-and-unpinning: Scripts to MitM all HTTPS traffic
Mobile
2026-04-16 2026Frida's Impact on Mobile Security and How to Fight Back
Frida's Impact on Mobile Security and How to Fight Back
Mobile
2026-04-16 2026From an Android Hook to RCE: $5000 Bounty
From an Android Hook to RCE: $5000 Bounty
Mobile
2026-04-11 2026Frida CodeShare: iOS Jailbreak Detection Bypass
Frida CodeShare: iOS Jailbreak Detection Bypass
Mobile
2026-04-11 2026iOS Jailbreak Detection Bypass with Frida - Full Guide
iOS Jailbreak Detection Bypass with Frida - Full Guide
Mobile
2026-04-10 2026Frida - OWASP Mobile Application Security Tool
Frida - OWASP Mobile Application Security Tool
Mobile
2026-04-03 2026Bypassing Certificate Pinning Using Frida: A Step-by-Step Guide
Bypassing Certificate Pinning Using Frida: A Step-by-Step Guide
Mobile
2026-04-03 2026Hail Frida!! The Universal SSL Pinning Bypass for Android
Hail Frida!! The Universal SSL Pinning Bypass for Android
Mobile
2026-04-03 2026Four Ways to Bypass Android SSL Verification and Certificate Pinning | NetSPI
Four Ways to Bypass Android SSL Verification and Certificate Pinning | NetSPI
Mobile
2026-04-03 2026Defeating Android Certificate Pinning with Frida
Defeating Android Certificate Pinning with Frida
Mobile

nmap nmap.org #

12 resources across 3 topics: AI, RCE, Recon.

DateResourceTopics
2026-04-17 2026Mastering Network Scanning: Nmap and Masscan Guide
Mastering Network Scanning: Nmap and Masscan Guide
Recon
2026-04-14 2026Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities
Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities https://ift.tt/Ib2LxWz
RCE
2026-02-16 2026How I Built a 5-Path AI “Recon Beast” with n8n and Gemini (2026 Guide)
In 2026, the bug bounty landscape requires more than just speed, with AI enhancing attacker capabilities. The article discusses building a 5-Path AI "Recon Beast" using n8n and Gemini. This innovative approach leverages automation and AI to enhance reconnaissance processes for bug bounty hunting. The focus is on utilizing technology to improve efficiency and effectiveness in identifying vulnerabilities.
AI
2025-04-11 2025Nmap for Beginners: Easy Tips to Scan Networks Like a Pro
So, Think this :::: one night when you are trying to sleep , suddenly you imagine what’s happening on your network .. what devices are connected? What services are they running? {JUST 2 AM THOUGHTS…
Recon
2025-03-22 2025A Deep Dive into Nmap Scripts for Web Application Testing | by Khaleel Khan | System Weakness
A Step-by-Step Guide to Leveraging Nmap’s Most Advanced Scripts for Comprehensive Web Application Security Analysis This scenario showcases how an experienced penetration tester could leverage Nmap’s…
Recon
2025-01-29 2025GitHub - Chleba/netscanner: Terminal Network scanner & diagnostic tool with modern TUI
Terminal Network scanner & diagnostic tool with modern TUI - Chleba/netscanner
Recon
2025-01-28 2025GitHub - aceberg/WatchYourLAN: Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history
Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history - aceberg/WatchYourLAN
Recon
2023-06-02 2023The Ultimate Guide to Port Scanning using Nmap | Nmap Notes
https://ift.tt/5cnRhOF
Recon
2023-04-20 2023Wazuh and NMAP integrarion for Network Vulnerability Scans
Wazuh and NMAP integrarion for Network Vulnerability Scans https://ift.tt/YLbjMJ9
Recon
2021-12-31 2021https://awesomeopensource.com/projects/go/nmap
https://awesomeopensource.com/projects/go/nmap
Recon
2021-12-31 2021A modern and easy-to-use network scanner with golang
A modern and easy-to-use network scanner with golang
Recon
2021-09-13 2021Haklukes Guide to NmapPort Scanning is Just The Beginning
Haklukes Guide to NmapPort Scanning is Just The Beginning
Recon

gitleaks github.com/gitleaks #

10 resources across 1 topic: Secrets.

DateResourceTopics
2026-04-22 2026GitHub Secret Scanning 2026: New Patterns, Push Protection
GitHub Secret Scanning 2026: New Patterns, Push Protection
Secrets
2026-04-19 2026Pre-Commit Hooks for Secret Detection: Setup in 10 Minutes
Pre-Commit Hooks for Secret Detection: Setup in 10 Minutes
Secrets
2026-04-19 2026Understanding Your Organization's Exposure to Secret Leaks — GitHub
Understanding Your Organization's Exposure to Secret Leaks — GitHub
Secrets
2026-04-19 2026Exposed Developer Secrets Surge: AI Drives 34% Increase in 2025
Exposed Developer Secrets Surge: AI Drives 34% Increase in 2025
Secrets
2026-04-19 2026GitHub Found 39M Secret Leaks in 2024 — The GitHub Blog
GitHub Found 39M Secret Leaks in 2024 — The GitHub Blog
Secrets
2026-04-11 2026Secret Scanning in CI Pipelines using Gitleaks
Secret Scanning in CI Pipelines using Gitleaks
Secrets
2026-04-11 2026Add a Local Gitleaks Pre-Commit Hook
Add a Local Gitleaks Pre-Commit Hook
Secrets
2026-04-10 2026Top 8 Git Secrets Scanners in 2026
Top 8 Git Secrets Scanners in 2026
Secrets
2026-04-03 2026TruffleHog vs. Gitleaks: A Detailed Comparison
TruffleHog vs. Gitleaks: A Detailed Comparison
Secrets
2026-04-03 2026Gitleaks - Find Secrets with Gitleaks
Gitleaks - Find Secrets with Gitleaks
Secrets

ffuf github.com/ffuf #

8 resources across 4 topics: API Sec, Bug Bounty, Fuzzing, Recon.

DateResourceTopics
2026-04-22 2026FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters
FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters
Recon
2026-04-11 2026Fuzzing Web Apps using FFUF: Complete Guide
Fuzzing Web Apps using FFUF: Complete Guide
Fuzzing
2026-04-11 2026FFUF Mastery: Advanced Web Fuzzing
FFUF Mastery: Advanced Web Fuzzing
Fuzzing
2025-08-14 2025A ffuf Primer | Daniel Miessler
The content seems to be a primer on the tool "ffuf" by Daniel Miessler. It likely introduces readers to the basics of using ffuf, a versatile web fuzzer commonly used for web application security testing. The primer may cover how to install and utilize ffuf effectively for tasks such as discovering hidden files or directories, identifying vulnerabilities, and conducting comprehensive web scans. Daniel Miessler, a well-known cybersecurity expert, is likely the author of this primer, providing valuable insights and guidance on leveraging ffuf for security testing purposes.
Bug Bounty
2023-09-03 2023ffuf advanced tricks - ACCEIS
ffuf advanced tricks Note: This article is also available in french 🇫🇷. What the ffuf? ffuf is the acronym of Fuzz Faster U Fool, it is a command line utility (CLI) intended for penetration testers (p...
API SecFuzzing
2022-01-16 2022How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes
How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes
Recon
2022-01-10 2022ffuf - Fuzz Faster U Fool
ffuf - Fuzz Faster U Fool
FuzzingRecon
2021-02-16 2021A ffuf Primer | Daniel Miessler
ffuf is a web attack tool written in Go, known as "fuzz faster you fool!". It operates through the command line interface (CLI) and is likened to Burp Intruder by experienced web testers.
Bug Bounty

Shodan shodan.io #

8 resources across 3 topics: OSINT, Recon, SSRF.

DateResourceTopics
2026-04-22 2026Shodan and Censys for beginners: How to find more vulnerabilities
Shodan and Censys for beginners: How to find more vulnerabilities
Recon
2026-04-17 2026Beyond Google: Navigating the Hidden Internet with Shodan and Censys
Beyond Google: Navigating the Hidden Internet with Shodan and Censys
OSINT
2026-04-17 2026sarenka: OSINT tool (Shodan/Censys) (GitHub)
sarenka: OSINT tool (Shodan/Censys) (GitHub)
OSINT
2025-09-21 2025Flask 3.1.1 SSRF Zero-Day Shodan dork exposed 500 targets 0day PoC (CWE-918) Full Article: nullsecurityx.codes/ssrf-vulnerabi Video: youtube.com/watch?v=Levx_p Responsible disclosure & defensive demo only. #infosec #vulnerability #SSRF #BugBounty
A zero-day vulnerability in Flask 3.1.1 related to SSRF was exposed through a Shodan dork, revealing 500+ potential targets. A proof of concept (PoC) for this vulnerability (CWE-918) was shared. The full article and a video demonstrating the issue were provided. The disclosure was done responsibly, and a defensive demo was included. The content emphasizes information security, vulnerability, SSRF, and Bug Bounty programs. The details can be found at nullsecurityx.codes/ssrf-vulnerabi and the video is available on YouTube.
SSRF
2025-09-21 2025New video: Flask 3.1.1 SSRF Zero-Day Shodan dork exposed 500 targets 0day PoC (CWE-918). Watch now youtube.com/watch?v=Levx_p Responsible disclosure & defensive demo only. #infosec #vulnerability #SSRF #BugBounty
A new video exposes a Flask 3.1.1 SSRF Zero-Day vulnerability using a Shodan dork that revealed 500+ targets with a 0day Proof of Concept (CWE-918). The content emphasizes responsible disclosure and includes a defensive demo. The video can be watched on YouTube. The focus is on information security, vulnerability, SSRF, and Bug Bounty programs.
SSRF
2025-09-21 2025PREMIERE TONIGHT: Flask 3.1.1 SSRF Zero-Day (CWE-918) 8:00 PM (03) In this video: Discover 500 potential targets via Shodan dork PoC demo Turn on notifications so you dont miss it! Watch here: youtube.com/watch?v=Levx_p #BugBounty #CyberSecurity #SSRF
A video premiering tonight at 8:00 PM showcases a Flask 3.1.1 SSRF Zero-Day vulnerability (CWE-918). The content includes a demonstration of discovering 500 potential targets using Shodan dork. Viewers are encouraged to turn on notifications to not miss the premiere. The video link is provided for watching. The focus is on Bug Bounty, Cybersecurity, and SSRF.
SSRF
2025-04-04 202510 Rare and Worthy Websites and Services for Security Professionals
While platforms like Shodan, OWASP, and VirusTotal are staples for security professionals, there are many lesser-known websites and services that offer equally valuable tools and resources. These…
OSINT
2024-12-14 2024🚀 Introducing ShodanSpider v2: Your Ultimate Free Tool for CVE Searching and Shodan Data Analysis…
In today’s fast-paced cybersecurity world, staying ahead of vulnerabilities is critical. ShodanSpider v2 takes your security research to…
Recon

Snyk snyk.io #

7 resources across 5 topics: golang, Secrets, SSRF, Supply Chain, XSS.

DateResourceTopics
2026-04-17 2026What is a Software Bill of Materials (SBOM)? (Snyk)
What is a Software Bill of Materials (SBOM)? (Snyk)
Supply Chain
2026-04-03 2026Why 28 Million Credentials Leaked on GitHub in 2025 | Snyk
Why 28 Million Credentials Leaked on GitHub in 2025 | Snyk
Secrets
2025-08-14 2025Go Security cheatsheet | Snyk Blog
The content is a Go Security cheatsheet available on the Snyk Blog. It likely contains valuable information and tips related to securing Go applications. Readers can refer to this cheatsheet for quick guidance on enhancing the security of their Go projects.
2025-08-14 2025What is SSRF (server-side request forgery)? | Tutorial & examples | Snyk Learn
The content discusses SSRF (server-side request forgery), explaining what it is and providing tutorials and examples. SSRF involves manipulating a server into making unintended requests on behalf of the attacker. The tutorial likely covers how to identify and prevent SSRF vulnerabilities to protect servers from unauthorized access or data leaks. It aims to educate readers on the risks associated with SSRF attacks and how to mitigate them effectively.
SSRF
2025-07-23 2025New #CVE Record: CVE-2025-8020 All #Snyk versions of the package private-ip are #vulnerable to Server-Side Request Forgery (#SSRF) where an attacker can provide an IP or #hostname that resolves to a #multicast IP address (224.0.0.0/4) which is not included as part of the private
The content discusses a new CVE record, CVE-2025-8020, indicating that all Snyk versions of the package private-ip are vulnerable to Server-Side Request Forgery (SSRF). This vulnerability allows an attacker to input an IP or hostname that resolves to a multicast IP address (224.0.0.0/4), not included in the private IP range. This poses a security risk.
SSRF
2024-07-22 2024DOM Based XSS | Tutorial & Examples | Snyk Learn | Snyk Learn
Learn how DOM based XSS exploits work, and how to mitigate and remediate the vulnerability with step-by-step interactive tutorials from security experts.
XSS
2022-02-21 2022Go Security cheatsheet | Snyk Blog
The cheatsheet on Go security best practices, created by Eric Smalling and Gerred Dillon, covers common topics to help users enhance security measures in Go programming.

Trivy trivy.dev #

6 resources across 2 topics: Secrets, Supply Chain.

DateResourceTopics
2026-04-18 2026Trivy Supply-Chain Attack: Trusted Scanner Compromised Rotate CI/CD Secrets Now
Trivy Supply-Chain Attack: Trusted Scanner Compromised, Rotate CI/CD Secrets Now https://ift.tt/thjxOop
Supply Chain
2026-04-15 2026GitHub Actions Supply Chain Attack: Trivy Breach & Workflow
GitHub Actions Supply Chain Attack: Trivy Breach & Workflow https://ift.tt/hyjDUWY
Supply Chain
2026-04-06 2026CERT-EU Confirms Trivy Supply Chain Attack Led to Credential Exposure
CERT-EU Confirms Trivy Supply Chain Attack Led to Credential Exposure
Secrets
2026-04-04 2026European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack
European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack https://ift.tt/rtNZKwj
Supply Chain
2026-04-03 2026Open Source Security Tool Trivy Hit by Supply Chain Attack Prompting Urgent Industry Response
Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response https://ift.tt/5MBpKYJ
Supply Chain
2026-04-02 2026Trivy supply chain intrusion reportedly compromises Cisco source code
Trivy supply chain intrusion reportedly compromises Cisco source code https://ift.tt/8Y4D9l2
Supply Chain

Caido caido.io #

4 resources across 2 topics: API Sec, Burp.

DateResourceTopics
2025-12-10 2025Web App Hacking: Finding Web App Vulnerabilities with Caido Scanner
Caido just became a serious Burp killer. Scanner plugin auto-detects vulns as you browse + launches targeted attacks on suspicious endpoints: https://t.co/wkiXeRK5CU
Burp
2025-12-03 2025Web App Hacking: Finding Web App Vulnerabilities with Caido Scanner
Caido just became a serious Burp killer. Scanner plugin auto-detects vulns as you browse + launches targeted attacks on suspicious endpoints: https://t.co/GqmmOXsL75 @three_cube
Burp
2023-10-04 2023A lightweight web security auditing toolkit
A lightweight web security auditing toolkit https://caido.io/
Burp
2023-07-19 2023Web App Hacking with Caido.io
Web App Hacking with Caido.io https://www.youtube.com/watch?v=lW-u_2EByT4
API SecBurp

mitmproxy mitmproxy.org #

4 resources across 3 topics: golang, GraphQL, Python.

DateResourceTopics
2026-01-17 2026pwviptbl/ProxyHunter: Aplicação Python com interface gráfica que permite configurar regras de interceptação para modificar parâmetros de requisições HTTP. Quando o navegador envia uma requisição para uma rota configurada, o proxy intercepta, modifica apenas os parâmetros especificados e encaminha a requisição mantendo todos os outros parâmetros originais.
Aplicação Python com interface gráfica que permite configurar regras de interceptação para modificar parâmetros de requisições HTTP. Quando o navegador envia uma requisição para uma rota configurad...
Python
2025-11-24 2025A Terminal client for HTTP/GraphQL/gRPC with support for SSH tunnels, WebSockets, SSE, workflows, profiling, OpenAPI and response diffs.
#golang https://t.co/sDSO3DWkkl
GraphQL
2024-11-29 2024Python Twisted proxy - how to intercept packets
I'm trying to print out the body of a HTTP response using Python. Here is my code sofar: from twisted.web import proxy, http from twisted.internet import reactor from twisted.python import log im...
Python
2021-01-22 2021projectdiscovery/proxify: Swiss Army knife Proxy tool for HTTP/HTTPS traffi
"projectdiscovery/proxify" is a versatile proxy tool designed for capturing, manipulating, and replaying HTTP/HTTPS traffic. It serves as a Swiss Army knife for handling various tasks related to network traffic on the go. The tool is available on GitHub under the projectdiscovery organization.

MobSF github.com/MobSF #

4 resources across 1 topic: Mobile.

DateResourceTopics
2026-04-22 2026Reversing Android Apps: Bypassing Detection Like a Pro
Reversing Android Apps: Bypassing Detection Like a Pro
Mobile
2026-04-11 2026Mobile Security Framework - MobSF Documentation
Mobile Security Framework - MobSF Documentation
Mobile
2026-04-11 2026MobSF: Mobile Security Framework (GitHub)
MobSF: Mobile Security Framework (GitHub)
Mobile
2026-04-03 2026OWASP Mobile Top 10 and MobSF
OWASP Mobile Top 10 and MobSF
Mobile

Postman postman.com #

4 resources across 2 topics: API Sec, Bug Bounty.

DateResourceTopics
2025-02-10 2025GitHub - usebruno/bruno: Opensource IDE For Exploring and Testing Api's (lightweight alternative to postman/insomnia)
Opensource IDE For Exploring and Testing Api's (lightweight alternative to postman/insomnia) - usebruno/bruno
API Sec
2024-12-13 2024Server SSL certificate verification - HTTPie 3.2.4 (latest) docs
To skip the host’s SSL certificate verification, you can pass --verify=no (default is yes).
API Sec
2022-06-09 2022Favorite tweet by @fardeenahmed411
Favorite tweet: API Bug-Bounty Tools Check list (Part - 1) - Postman (It is like Burpsuite for API) - APISec - AppKnox - Synopsis API Scanner - Data Theorem API Secure #cybersecuritytips #bugbountyti...
API SecBug Bounty
2021-08-25 2021API Testing with HTTPie
API Testing with HTTPie
API Sec

BeEF beefproject.com #

3 resources across 3 topics: Bug Bounty, Recon, XSS.

DateResourceTopics
2023-04-02 2023How to Hack Web Browsers with BeEF Framework
How to Hack Web Browsers with BeEF Framework https://ift.tt/r8zkdW9
XSS
2022-05-11 2022Favorite tweet by @Nickieyey
Favorite tweet: Top XSS (Cross Site Scripting) Tools : 1) BeeF 2) BlueLotus_XSSReceiver 3) xssor2 4) Xsser-Varbaek 5) Xsser-Epsylon 6) Xenotix #pentesting #ethicalhacking #cybersecurity #CyberSec #we...
Bug BountyXSS
2021-12-06 2021How to run BeEF behind an nginx reverse proxy with SSL correctly
How to run BeEF behind an nginx reverse proxy with SSL correctly
Recon

dirsearch github.com/maurosoria #

3 resources across 3 topics: AuthN, Recon, SSRF.

DateResourceTopics
2025-08-14 2025My First Case of SSRF Using Dirsearch | by Mba-oji Chiagoziem | Medium
The content appears to be a personal account titled "My First Case of SSRF Using Dirsearch" by Mba-oji Chiagoziem on Medium. The author likely shares their experience encountering a Server-Side Request Forgery (SSRF) vulnerability while using the tool Dirsearch. The article may delve into the details of how the SSRF vulnerability was discovered, the implications of such a vulnerability, and potentially offer insights or lessons learned from the experience.
SSRF
2023-10-04 2023Directory Listing
Directory Listing https://ift.tt/hdv6BCV
Recon
2023-09-03 2023GitHub - dirkjanm/adidnsdump: Active Directory Integrated DNS dumping by any authenticated user
Active Directory Integrated DNS dumping by any authenticated user - GitHub - dirkjanm/adidnsdump: Active Directory Integrated DNS dumping by any authenticated user
AuthN

semgrep semgrep.dev #

3 resources across 3 topics: Python, RCE, Supply Chain.

DateResourceTopics
2026-04-16 2026tj-actions/changed-files Compromised - Semgrep
tj-actions/changed-files Compromised - Semgrep
Supply Chain
2026-04-03 2026Insecure Deserialization in Python | Semgrep
Insecure Deserialization in Python | Semgrep
Python
2021-12-13 2021Semgrep
Semgrep
RCESupply Chain

subfinder github.com/projectdiscovery #

3 resources across 2 topics: Bug Bounty, Recon.

DateResourceTopics
2026-04-19 2026SubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025
SubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025
Recon
2026-04-03 2026Subfinder Complete Guide 2025: Subdomain Enumeration Mastery
Subfinder Complete Guide 2025: Subdomain Enumeration Mastery
Recon
2019-08-20 2019Automated monitoring of subdomains for fun and profit — Release of Sublert
"Sublert" is a tool released for automated monitoring of subdomains for bug bounty programs. The bug bounty industry is rapidly growing, leading to fierce competition among programs. Sublert aims to assist in identifying security vulnerabilities in subdomains, potentially leading to financial rewards for bug hunters.
Bug Bounty

Wireshark wireshark.org #

3 resources across 2 topics: Python, Recon.

DateResourceTopics
2023-11-05 2023TrafficWatch - TrafficWatch A Packet Sniffer Tool Allows You To Monitor And Analyze Network Traffic From PCAP Files
TrafficWatch - TrafficWatch, A Packet Sniffer Tool, Allows You To Monitor And Analyze Network Traffic From PCAP Files https://ift.tt/c1tg2uv
Recon
2023-01-31 2023Creating an Advanced Network Packet Sniffer in Python: A Step-by-Step Guide
The content is a step-by-step guide on creating an advanced network packet sniffer using Python. It provides detailed instructions on how to build the sniffer tool, which can capture and analyze network packets for various purposes. The guide likely covers topics such as setting up the necessary libraries, capturing packets, analyzing packet data, and potentially implementing additional features for advanced functionality. Overall, the content aims to help readers understand the process of creating a network packet sniffer using Python through a structured and informative guide.
Python
2022-01-15 2022Capturing Network Traffic With Python And TShark
Capturing Network Traffic With Python And TShark
Python