Browse by tool
Resources tagged to a specific AppSec tool — Burp Suite, sqlmap, nuclei, Frida, and others. Tools with fewer than 3 resources are not listed. The same resource can appear under multiple topics; topic tags in each row link back to the topic page.
Burp Suite 241
sqlmap 47
nuclei 18
OWASP ZAP 16
TruffleHog 14
amass 12
Frida 12
nmap 12
gitleaks 10
ffuf 8
Shodan 8
Snyk 7
Trivy 6
Caido 4
mitmproxy 4
MobSF 4
Postman 4
BeEF 3
dirsearch 3
semgrep 3
subfinder 3
Wireshark 3
Burp Suite portswigger.net #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | PortSwigger Lab: Exploiting a Mass Assignment Vulnerability PortSwigger Lab: Exploiting a Mass Assignment Vulnerability | API Sec |
| 2026-04-22 2026 | GraphQL - PortSwigger Lab Writeup GraphQL - PortSwigger Lab Writeup | Bug Bounty |
| 2026-04-22 2026 | SulphurAPI: Burp Suite extension for automating OWASP API Top 10 detection SulphurAPI: Burp Suite extension for automating OWASP API Top 10 detection | Burp |
| 2026-04-22 2026 | Awesome Burp Extensions 2025 Awesome Burp Extensions 2025 | Burp |
| 2026-04-22 2026 | The Future of Security Testing: AI-Powered Extensibility in Burp The Future of Security Testing: AI-Powered Extensibility in Burp | Burp |
| 2026-04-22 2026 | Filtering the WebSockets history with scripts Filtering the WebSockets history with scripts | Burp |
| 2026-04-22 2026 | Filtering the HTTP history with scripts (Bambdas) Filtering the HTTP history with scripts (Bambdas) | Burp |
| 2026-04-22 2026 | Developing AI features in Burp extensions Developing AI features in Burp extensions | Burp |
| 2026-04-22 2026 | Burp AI - PortSwigger Documentation Burp AI - PortSwigger Documentation | Burp |
| 2026-04-22 2026 | Bambdas - PortSwigger Documentation Bambdas - PortSwigger Documentation | Burp |
| 2026-04-22 2026 | Hunting for IDOR and BAC in B2B Apps with Burp Authorize Hunting for IDOR and BAC in B2B Apps with Burp Authorize | IDOR |
| 2026-04-22 2026 | IDOR-Scanner: Burp Suite Extension for Automated IDOR Detection IDOR-Scanner: Burp Suite Extension for Automated IDOR Detection | IDOR |
| 2026-04-20 2026 | Meta and PortSwigger drive offensive security further to find what others miss Meta and PortSwigger drive offensive security further to find what others miss https://ift.tt/gc5osvx | Bug Bounty |
| 2026-04-19 2026 | Pentest-Mapper: Burp Extension for Pentesters & Bug Bounty Pentest-Mapper: Burp Extension for Pentesters & Bug Bounty | Burp |
| 2026-04-19 2026 | Burp Suite Extension: Copy For — Black Hills InfoSec Burp Suite Extension: Copy For — Black Hills InfoSec | Burp |
| 2026-04-19 2026 | Burp AI — PortSwigger Burp AI — PortSwigger | Burp |
| 2026-04-19 2026 | Pentest Mapper: Burp Extension for Application Pentesting Pentest Mapper: Burp Extension for Application Pentesting | Burp |
| 2026-04-19 2026 | Pentest Mapper — PortSwigger BApp Store Pentest Mapper — PortSwigger BApp Store | Burp |
| 2026-04-17 2026 | Maximizing IDOR Detection with Burp Suite's Autorize Maximizing IDOR Detection with Burp Suite's Autorize | IDOR |
| 2026-04-17 2026 | Manual and semi-automated testing for IDORs using Burp Suite Manual and semi-automated testing for IDORs using Burp Suite | IDOR |
| 2026-04-17 2026 | Testing for IDORs (PortSwigger Burp docs) Testing for IDORs (PortSwigger Burp docs) | IDOR |
| 2026-04-16 2026 | IDOR Hunting with Burp Suite: A $1,000 Bug Bounty Case Study IDOR Hunting with Burp Suite: A $1,000 Bug Bounty Case Study | IDOR |
| 2026-04-16 2026 | InQL: Advanced GraphQL Security Testing Burp Extension InQL: Advanced GraphQL Security Testing Burp Extension | GraphQL |
| 2026-04-16 2026 | Burp Suite Professional Testing Handbook Burp Suite Professional Testing Handbook | Burp |
| 2026-04-16 2026 | Bambdas Collection for Burp Suite Professional and Community Bambdas Collection for Burp Suite Professional and Community | Burp |
| 2026-04-16 2026 | BurpSuite for Pentester - Vulnerability Hunting Cheatsheet BurpSuite for Pentester - Vulnerability Hunting Cheatsheet | Burp |
| 2026-04-16 2026 | Weaponize Your Burp - Bug Bounty Hunting Automation Weaponize Your Burp - Bug Bounty Hunting Automation | Burp |
| 2026-04-16 2026 | Smart Automation with Burp Suite - YesWeHack Smart Automation with Burp Suite - YesWeHack | Burp |
| 2026-04-16 2026 | A Guide to Build Burp Suite Extensions Using Montoya API and Java A Guide to Build Burp Suite Extensions Using Montoya API and Java | Burp |
| 2026-04-16 2026 | Power Up Pen Tests: Create Burp Suite Extensions with Montoya API Power Up Pen Tests: Create Burp Suite Extensions with Montoya API | Burp |
| 2026-04-16 2026 | Burp Suite Extensions - Overview and Introduction with Kotlin Burp Suite Extensions - Overview and Introduction with Kotlin | Burp |
| 2026-04-16 2026 | Creating Burp Extensions: A Beginner's Guide - Black Hills InfoSec Creating Burp Extensions: A Beginner's Guide - Black Hills InfoSec | Burp |
| 2026-04-16 2026 | PortSwigger's Top 10 Web Hacking Techniques of 2025 PortSwigger's Top 10 Web Hacking Techniques of 2025 | Bug Bounty |
| 2026-04-14 2026 | Found SSRF vulnerability allowed to access admin panel and delete user account. StockAPI Burp Intruder Admin URL Deleted user account (carlos) #SSRF #WebSecurityAcademy #Portswigger #Lab #Vulnerability pic.x.com/EiIMQEUyxQ Found SSRF vulnerability allowed to access admin panel and delete user account. StockAPI Burp Intruder Admin URL Deleted user account (carlos) #SSRF #WebSecurityAcademy #Portswigger #Lab #Vulnerab... | SSRF |
| 2026-04-10 2026 | OWASP Testing for Server Side Template Injection OWASP Testing for Server Side Template Injection | SSTI |
| 2026-04-10 2026 | Server-side template injection PortSwigger KB Server-side template injection PortSwigger KB | SSTI |
| 2026-04-10 2026 | Template Injection Research | PortSwigger Research Template Injection Research | PortSwigger Research | SSTI |
| 2026-04-10 2026 | Server-Side Template Injection | PortSwigger Research Server-Side Template Injection | PortSwigger Research | SSTI |
| 2026-04-10 2026 | Server-side template injection | Web Security Academy Server-side template injection | Web Security Academy | SSTI |
| 2026-04-10 2026 | PortSwigger KB: JWT none algorithm supported PortSwigger KB: JWT none algorithm supported | JWT |
| 2026-04-10 2026 | Working with JWTs in Burp Suite Working with JWTs in Burp Suite | JWT |
| 2026-04-10 2026 | JSON Web Token Attacker Burp extension JSON Web Token Attacker Burp extension | JWT |
| 2026-04-10 2026 | JWT Scanner Burp extension JWT Scanner Burp extension | JWT |
| 2026-04-10 2026 | PortSwigger jwt-editor: Burp Suite extension for editing and signing JWTs PortSwigger jwt-editor: Burp Suite extension for editing and signing JWTs | JWT |
| 2026-04-10 2026 | Blind SSRF with Burp Collaborator Blind SSRF with Burp Collaborator | SSRF |
| 2026-04-10 2026 | Mastering Blind SSRF Detection With Burp Suite Mastering Blind SSRF Detection With Burp Suite | SSRF |
| 2026-04-10 2026 | Testing for Blind SSRF with Burp Suite Testing for Blind SSRF with Burp Suite | SSRF |
| 2026-04-10 2026 | Uncovering Blind SSRF Using Burp Collaborator Uncovering Blind SSRF Using Burp Collaborator | SSRF |
| 2026-04-10 2026 | Burp Suite Certified Practitioner Guide 2026 Burp Suite Certified Practitioner Guide 2026 | Burp |
| 2026-04-10 2026 | Top 10 Burp Extensions Every Pentester Should Use Top 10 Burp Extensions Every Pentester Should Use | Burp |
| 2026-04-10 2026 | Burp AI in 2026: Real Workflow Changes Burp AI in 2026: Real Workflow Changes | Burp |
| 2026-04-10 2026 | Burp Suite Professional 2026.1 Release Burp Suite Professional 2026.1 Release | Burp |
| 2026-04-10 2026 | Burp Suite Professional 2025.5 Release Burp Suite Professional 2025.5 Release | Burp |
| 2026-04-10 2026 | 10 Burp Suite Extensions That Will Instantly Boost Your Work 10 Burp Suite Extensions That Will Instantly Boost Your Work | Burp |
| 2026-04-10 2026 | How Burp Suite DAST Is Leveling Up Enterprise Security in 2025 How Burp Suite DAST Is Leveling Up Enterprise Security in 2025 | Burp |
| 2026-04-10 2026 | Burp Suite Professional 2025.2: Built-in AI Integration Burp Suite Professional 2025.2: Built-in AI Integration | Burp |
| 2026-04-10 2026 | PortSwigger Blind XXE Lab Write-up PortSwigger Blind XXE Lab Write-up | XXE |
| 2026-04-10 2026 | PortSwigger XXE Injection Writeups PortSwigger XXE Injection Writeups | XXE |
| 2026-04-10 2026 | Insecure Direct Object References (IDOR) | PortSwigger Insecure Direct Object References (IDOR) | PortSwigger | AuthZIDOR |
| 2026-04-10 2026 | 100+ Burp Suite Online Courses for 2026 100+ Burp Suite Online Courses for 2026 | Burp |
| 2026-04-10 2026 | Burp Suite AI Extension for Pentester Burp Suite AI Extension for Pentester | Burp |
| 2026-04-10 2026 | Burp Suite Goes AI: Revolutionizing Web Pentesting Burp Suite Goes AI: Revolutionizing Web Pentesting | Burp |
| 2026-04-10 2026 | Burp Suite Integration for Neuron Burp Suite Integration for Neuron | Burp |
| 2026-04-10 2026 | The Future of Pentesting: Burp Suite + Cursor AI The Future of Pentesting: Burp Suite + Cursor AI | Burp |
| 2026-04-10 2026 | SQL Injection Tutorial & Examples - PortSwigger SQL Injection Tutorial & Examples - PortSwigger | SQLi |
| 2026-04-10 2026 | GraphQL API Vulnerabilities - PortSwigger GraphQL API Vulnerabilities - PortSwigger | GraphQL |
| 2026-04-06 2026 | Toolchain: Nmap, Burp Suite, and Metasploit - A Practical Workflow Guide Toolchain: Nmap, Burp Suite, and Metasploit - A Practical Workflow Guide | Burp |
| 2026-04-06 2026 | Top 10 Burp Suite Extensions Every Pentester Should Use Top 10 Burp Suite Extensions Every Pentester Should Use | Burp |
| 2026-04-03 2026 | Lab: SameSite Lax Bypass via Cookie Refresh | PortSwigger Lab: SameSite Lax Bypass via Cookie Refresh | PortSwigger | CSRF |
| 2026-04-03 2026 | Lab: SameSite Lax Bypass via Method Override | PortSwigger Lab: SameSite Lax Bypass via Method Override | PortSwigger | CSRF |
| 2026-04-03 2026 | Installing Extensions from BApp Store | PortSwigger Installing Extensions from BApp Store | PortSwigger | Burp |
| 2026-04-03 2026 | 3 Powerful Burp Suite Extensions Every Pentester Should Use 3 Powerful Burp Suite Extensions Every Pentester Should Use | Burp |
| 2026-04-03 2026 | BApp Store | PortSwigger BApp Store | PortSwigger | Burp |
| 2026-04-03 2026 | Burp Suite Professional BApps: Maximizing Pentester Productivity Burp Suite Professional BApps: Maximizing Pentester Productivity | Burp |
| 2026-04-03 2026 | Burp Bounty - Scan Check Builder Extension Burp Bounty - Scan Check Builder Extension | Burp |
| 2026-04-03 2026 | Burp Suite - Top Extensions | KSEC ARK Pentesting Knowledge Base Burp Suite - Top Extensions | KSEC ARK Pentesting Knowledge Base | Burp |
| 2026-04-03 2026 | Top 10 Must-Have Burp Suite Extensions for Web Application Security (2024) Top 10 Must-Have Burp Suite Extensions for Web Application Security (2024) | Burp |
| 2026-04-03 2026 | Top 10 Pentesting Tools and Extensions in Burp Suite | PortSwigger Top 10 Pentesting Tools and Extensions in Burp Suite | PortSwigger | Burp |
| 2026-04-03 2026 | Top 20 Useful Burp Suite Extensions for Web Application Pentesting Top 20 Useful Burp Suite Extensions for Web Application Pentesting | Burp |
| 2026-04-03 2026 | Cross-Site Scripting (XSS) Cheat Sheet - 2026 Edition | PortSwigger Cross-Site Scripting (XSS) Cheat Sheet - 2026 Edition | PortSwigger | XSS |
| 2026-04-03 2026 | Access Control Vulnerabilities and Privilege Escalation | PortSwigger Access Control Vulnerabilities and Privilege Escalation | PortSwigger | AuthZ |
| 2026-04-03 2026 | Lab: Exploiting Ruby Deserialization Using a Documented Gadget Chain | PortSwigger Lab: Exploiting Ruby Deserialization Using a Documented Gadget Chain | PortSwigger | Deser |
| 2026-04-03 2026 | Exploiting Insecure Deserialization Vulnerabilities | PortSwigger Exploiting Insecure Deserialization Vulnerabilities | PortSwigger | Deser |
| 2026-04-03 2026 | API Testing with Burp Suite: A Practical Guide API Testing with Burp Suite: A Practical Guide | API Sec |
| 2026-04-02 2026 | Network Penetration Testing Tools Market Is Going to Boom |? Nessus ? Burp Suite ? Metasploit Network Penetration Testing Tools Market Is Going to Boom |? Nessus ? Burp Suite ? Metasploit https://ift.tt/fCDeuAg | Burp |
| 2026-02-11 2026 | SILENTCHAIN AI - AI-Powered Security Testing Free AI-powered vulnerability detection for Burp Suite. Detect OWASP Top 10 with context-aware analysis. | AIBurp |
| 2026-01-29 2026 | How I Made Burp Suite My IDOR-Finding Robot Butler (And Found 20+ Bugs) 🤖🔍 The content titled "How I Made Burp Suite My IDOR-Finding Robot Butler (And Found 20+ Bugs)" likely discusses utilizing the Burp Suite tool to automate the discovery of Insecure Direct Object Reference (IDOR) vulnerabilities, leading to the identification of over 20 bugs. The author shares their experience and strategies for leveraging Burp Suite effectively in bug hunting. The content may provide insights into the process of using automation tools for security testing and the successful outcomes achieved through this approach. | Bug BountyBurpIDOR |
| 2026-01-26 2026 | WebHackDiaries Part 4: SSRF Just completed the SSRF labs on PortSwigger Web Security Academy. Key lesson: SSRF isnt about URLs its about broken trust boundaries. On to the next labs #WebHackDiaries #SSRF #PortSwigger #WebSecurity #BugBounty #CyberSecuripic.x.com/RgANMeoaW2aW2 The content discusses completing SSRF labs on PortSwigger Web Security Academy, emphasizing that SSRF is about broken trust boundaries, not just URLs. The focus is on learning and moving on to the next labs. Key hashtags include #WebHackDiaries, #SSRF, #PortSwigger, #WebSecurity, #BugBounty, and #CyberSecuri. The post includes a link to a picture. | SSRF |
| 2026-01-24 2026 | Burp Suite | Pentest Book Burp Suite | Pentest Book | Burp |
| 2026-01-22 2026 | Testing for reflected XSS manually with Burp Suite The content discusses how to manually test for reflected cross-site scripting (XSS) vulnerabilities using Burp Suite, a popular web application security testing tool. By utilizing Burp Suite, security professionals can identify and exploit XSS vulnerabilities in web applications to enhance their security posture. Manual testing allows for a more thorough examination of potential vulnerabilities compared to automated tools. This process involves sending crafted payloads to the application and analyzing the responses to detect any XSS vulnerabilities. By following these steps, security testers can effectively identify and mitigate XSS risks in web applications. | XSS |
| 2026-01-21 2026 | Testing for stored XSS with Burp Suite The content discusses using Burp Suite to test for stored Cross-Site Scripting (XSS) vulnerabilities. Burp Suite is a popular web application security testing tool that helps identify and exploit security issues. Stored XSS occurs when malicious scripts are stored on a website and executed when viewed by other users. By using Burp Suite, security professionals can scan web applications for stored XSS vulnerabilities, helping to identify and mitigate potential security risks. Testing for stored XSS is crucial to prevent attackers from injecting harmful scripts into websites and compromising user data. | XSS |
| 2026-01-20 2026 | MantisSTS/JSReconduit: Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode. Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode. - MantisSTS/JSReconduit | BurpRecon |
| 2026-01-19 2026 | Testing for SSRF with Burp Suite The content discusses using Burp Suite, a popular web application security testing tool, to test for Server-Side Request Forgery (SSRF) vulnerabilities. SSRF allows attackers to send crafted requests from the server to other internal systems, potentially leading to data leaks or unauthorized access. Burp Suite can help identify and mitigate SSRF vulnerabilities by intercepting and modifying requests, analyzing responses, and identifying potential SSRF points of entry. By utilizing Burp Suite's features effectively, security professionals can enhance their SSRF testing capabilities and strengthen the security posture of web applications. | SSRF |
| 2026-01-18 2026 | Testing for blind SSRF with Burp Suite The content discusses using Burp Suite to test for blind Server-Side Request Forgery (SSRF). SSRF vulnerabilities allow attackers to make unauthorized requests from a server. Burp Suite, a popular web vulnerability scanner, can help identify blind SSRF by analyzing responses for indicators of SSRF attacks. Testing for blind SSRF with Burp Suite involves sending crafted requests to the target server and analyzing the responses for potential SSRF behavior. This method can help security professionals identify and mitigate SSRF vulnerabilities in web applications. | SSRF |
| 2026-01-16 2026 | Included Skills: 𝐛𝐮𝐫𝐩𝐬𝐮𝐢𝐭𝐞-𝐩𝐫𝐨𝐣𝐞𝐜𝐭-𝐩𝐚𝐫𝐬𝐞𝐫 - Search/extract data from Burp Suite projects 𝐝𝐢𝐟𝐟𝐞𝐫𝐞𝐧𝐭𝐢𝐚𝐥-𝐫𝐞𝐯𝐢𝐞𝐰 - Security-focused differential review of code changes The content discusses two included skills: searching/extracting data from Burp Suite projects and conducting a security-focused differential review of code changes. These skills are valuable for individuals involved in cybersecurity or software development. The link provided likely offers more detailed information on these skills. | Burp |
| 2026-01-02 2026 | repplus/rep: rep+ — Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks The content discusses "rep+", a tool that functions as a Burp-style HTTP Repeater for Chrome DevTools. It includes built-in AI capabilities to explain requests and recommend potential attacks. The tool aims to enhance the user's experience by providing advanced features for analyzing and manipulating HTTP requests within the Chrome browser environment. | Burp |
| 2025-12-30 2025 | Teycir/BurpAPISecuritySuite: Burp Suite extension for API security testing with 15 attack types, 108+ payloads, intelligent fuzzing, BOLA/IDOR detection, AI integration, and automated reconnaissance. Supports REST/GraphQL/SOAP APIs with Nuclei, Turbo Intruder, and external tool integration. OWASP API Top 10 coverage. Burp Suite extension for API security testing with 15 attack types, 108+ payloads, intelligent fuzzing, BOLA/IDOR detection, AI integration, and automated reconnaissance. Supports REST/GraphQL/SOAP... | API SecBurpFuzzingGraphQL |
| 2025-12-12 2025 | I completed the @WebSecAcademy lab: Blind SSRF with Shellshock exploitation my first Expert-level lab! Huge thanks to @PortSwigger this one was intense and super fun. #BugBounty #SSRF #securitymindset portswigger.net/web-security/sGpic.x.com/coygKcXqSrSr The content highlights the completion of an Expert-level lab on Blind SSRF with Shellshock exploitation by @WebSecAcademy. The individual expresses gratitude to @PortSwigger for the intense and enjoyable experience. The post includes hashtags #BugBounty, #SSRF, and #securitymindset. The link provided leads to web-security information. | SSRF |
| 2025-12-09 2025 | Day 20/30 SSRF forged on @PortSwigger! Scanned internals bypassed blacklists blind exfil 2 labs owned including OOB chains. Takeaway: Never trust user-supplied URLs without validation! #SSRF #WebSecurity #PortSwiggerAcademy #BugBounty #EthicalHacking @ethivolt pic.x.com/VKIxogbRG0 Day 20/30 of SSRF testing on @PortSwigger resulted in bypassing blacklists, blind exfiltration, and owning 2 labs with OOB chains. Key takeaway: Always validate user-supplied URLs to prevent SSRF attacks. #SSRF #WebSecurity #PortSwiggerAcademy #BugBounty #EthicalHacking @ethivolt. | SSRF |
| 2025-11-04 2025 | DAY 3-5/30 Deep-dive on SSRF research to strengthen real-world exploitation skills Completed 2/18 SQLi labs on @PortSwigger #BugBounty #SSRF #SQLi #WebSecurity #Infosec The content highlights progress made on days 3-5 of a 30-day deep dive into SSRF research to enhance real-world exploitation skills. It mentions completing SQL injection labs on @PortSwigger on February 18. The focus is on bug bounty, SSRF, SQLi, web security, and infosec. The post indicates active engagement in cybersecurity research and skill development in the context of bug bounty programs. | SSRF |
| 2025-11-03 2025 | Completed my first basic SSRF lab on #PortSwigger today. Used an #SSRF to make the server request http://localhost which let me reach the internal /admin #endpoint and delete a user without admin #credentials. #hacking #security The content describes completing a basic SSRF lab on PortSwigger, utilizing SSRF to send a server request to http://localhost, accessing the internal /admin endpoint, and deleting a user without admin credentials. The post highlights the hacking and security aspects of this exercise. | SSRF |
| 2025-11-03 2025 | Completed my first basic SSRF lab on #PortSwigger today. Used an #SSRF to make the server request http://localhost which let me reach the internal /admin #endpoint and delete a user without admin #credentials. #hacking #security The content discusses completing a basic SSRF lab on PortSwigger by using SSRF to send a server request to http://localhost, accessing the internal /admin endpoint, and deleting a user without admin credentials. This demonstrates a security vulnerability that could be exploited for unauthorized actions. The post highlights the importance of understanding and securing against SSRF attacks in the context of hacking and security. | SSRF |
| 2025-10-30 2025 | DAY 1/30 - SSRF learning path completed on @PortSwigger Web Security Academy. #SSRF #WebSecurity The user completed the SSRF learning path on PortSwigger Web Security Academy on the first day of a 30-day challenge. The achievement was shared on social media with hashtags #SSRF and #WebSecurity. | SSRF |
| 2025-09-23 2025 | Server leaking secrets? Thats SSRF! Conquered Intro to SSRF on @TryHackMe. Tips: 1) Tweak URL params (e.g. 127.0.0.1) for recon. 2) Use Burp Collaborator for blind SSRF. 3) Whitelist URLs. Whos next? #CyberSec #SSRF #TryHackMe The content discusses Server-Side Request Forgery (SSRF) vulnerabilities and provides tips for exploiting them, such as manipulating URL parameters for reconnaissance, utilizing Burp Collaborator for blind SSRF attacks, and whitelisting URLs for protection. The author shares their success in mastering an "Intro to SSRF" challenge on TryHackMe and encourages others to try it. The post is tagged with #CyberSec, #SSRF, and #TryHackMe. | SSRF |
| 2025-08-28 2025 | SSRF Tip: Test with payloads like or AWS . Use DNS loggers (Burp Collaborator) for blind SSRF. Prevention: whitelist domains #SSRF #BugBounty #WebSecurity #EthicalHacking The content provides a tip for testing SSRF vulnerabilities using payloads like `http://169.254.169.254` or AWS. It suggests using DNS loggers like Burp Collaborator for blind SSRF testing. Prevention advice includes whitelisting domains. The post is related to SSRF, Bug Bounty, Web Security, and Ethical Hacking, emphasizing the importance of testing and securing against SSRF vulnerabilities. | SSRF |
| 2025-08-14 2025 | Crushing bugs one lab at a time! Another PortSwigger Web Security Academy challenge SSRF with Whitelist-Based Input Filter. #CyberSecurity #PortSwigger #SSRF #WebSecurity #BugBounty #TechandAction #TechInAction The content highlights a cybersecurity challenge from PortSwigger Web Security Academy focusing on SSRF with a Whitelist-Based Input Filter. The post emphasizes bug crushing in labs, showcasing a hands-on approach to cybersecurity. It also includes relevant hashtags like #CyberSecurity, #PortSwigger, #SSRF, #WebSecurity, #BugBounty, #TechandAction, and #TechInAction. The challenge aims to enhance skills in identifying and mitigating security vulnerabilities. | SSRF |
| 2025-08-14 2025 | GitHub - asciimoo/wuzz: Interactive cli tool for HTTP inspection The content is a brief description of a tool called "wuzz" available on GitHub. It is an interactive command-line interface tool designed for inspecting HTTP requests and responses. The tool allows users to interactively explore and analyze HTTP traffic. It is likely a useful resource for developers and individuals working with HTTP protocols to troubleshoot, debug, and understand network interactions efficiently. | |
| 2025-08-14 2025 | (186) @Jhaddix Talks About Defcon, Burp Suite, Hacking, Bug Bounties and Ho The content discusses @Jhaddix's insights on Defcon, Burp Suite, hacking, bug bounties, and more in a concise manner. It likely covers topics related to cybersecurity, ethical hacking, and bug bounty programs. The content may provide valuable information and perspectives on these subjects from @Jhaddix's expertise. | Talks |
| 2025-08-14 2025 | Top 10 web hacking techniques of 2022 | PortSwigger Research The content is about the top 10 web hacking techniques of 2022 as researched by PortSwigger. It likely delves into the latest methods and strategies used by hackers to exploit vulnerabilities in web systems. This information can be valuable for cybersecurity professionals, developers, and organizations to understand current threats and enhance their defenses against cyber attacks. | Bug Bounty |
| 2025-08-14 2025 | d0ge/sign-saboteur: SignSaboteur is a Burp Suite extension for editing, sig "SignSaboteur" is a Burp Suite extension called d0ge/sign-saboteur that allows for editing and modifying signatures. | Burp |
| 2025-08-14 2025 | 254Labs/awesome-bambdas: A collection of Burp Suite Lambda Filters ~ Bambda 254Labs/awesome-bambdas is a repository that contains a collection of Burp Suite Lambda Filters known as Bambda. These filters are designed to enhance the functionality of Burp Suite, a popular web application security testing tool. The repository likely offers a variety of Lambda Filters that can be used to customize and improve the performance of Burp Suite during security assessments and testing. | Burp |
| 2025-08-14 2025 | Burp Extension Dev Part 4: GUI Design - TCM Security The content discusses the fourth part of developing a Burp extension, focusing on GUI design and TCM Security. It likely delves into creating a graphical user interface for the extension and incorporating security considerations related to TCM (Threat and Countermeasure) Security. The article may provide insights on how to design a user-friendly interface for the extension while ensuring that security measures are implemented to address potential threats. | Burp |
| 2025-08-14 2025 | GitHub - federicodotta/Burp-Suite-Extender-Montoya-Course: This repository The content is a brief description of a GitHub repository named "Burp-Suite-Extender-Montoya-Course" created by user federicodotta. The repository likely contains resources related to extending the capabilities of Burp Suite, a popular web application security testing tool. It appears to be a course or collection of materials curated by the user for educational purposes. | Burp |
| 2025-08-14 2025 | GitHub - dwisiswant0/ngocok: ngrok Collaborator Link — yet another Burp Col The content refers to a GitHub repository named dwisiswant0/ngocok, which involves ngrok collaborator link for Burp Suite. The repository seems to offer a tool or script related to ngrok and Burp Suite integration. | Burp |
| 2025-08-14 2025 | Burp Extension Dev Part 1: Setup & Basics - TCM Security The content titled "Burp Extension Dev Part 1: Setup & Basics - TCM Security" likely provides guidance on setting up and understanding the basics of developing Burp extensions, a popular tool for web security testing. It is part of a series by TCM Security, a company specializing in cybersecurity. The content may cover essential steps and foundational knowledge required for developing Burp extensions, serving as a starting point for individuals interested in enhancing the capabilities of this tool for security testing purposes. | Burp |
| 2025-08-14 2025 | Writing Burp Bambda Filters Like a Boss The content appears to be a title stating "Writing Burp Bambda Filters Like a Boss." It suggests that the focus is on mastering the skill of writing Burp Bambda filters effectively. The title implies that the content will likely provide guidance or tips on how to excel in creating these filters with expertise and confidence. | Burp |
| 2025-08-14 2025 | synfron/ReshaperForBurp The content is a reference to a tool called "synfron/ReshaperForBurp." It appears to be a software tool or plugin, likely designed for use with the Burp Suite, a popular web application security testing tool. The tool may offer features to enhance or modify the functionality of Burp Suite, potentially aiding in security testing, vulnerability assessment, or other related tasks. The content is concise and does not provide detailed information about the tool's specific features or capabilities. | Burp |
| 2025-08-14 2025 | Improve your API Security Testing with Burp BCheck Scripts The content emphasizes enhancing API security testing by utilizing Burp BCheck Scripts. These scripts can be beneficial in identifying vulnerabilities and ensuring the security of APIs. By incorporating these scripts into the testing process, users can enhance the effectiveness and efficiency of their API security assessments. | Burp |
| 2025-08-14 2025 | DNS Analyzer - Finding DNS vulnerabilities with Burp Suite - SEC Consult The content discusses using the DNS Analyzer tool in Burp Suite to identify vulnerabilities in DNS configurations. Developed by SEC Consult, this tool helps security professionals assess and strengthen DNS security by detecting weaknesses that could be exploited by attackers. By leveraging Burp Suite's capabilities, users can analyze DNS settings, identify potential vulnerabilities, and take proactive measures to enhance the security of their DNS infrastructure. | Burp |
| 2025-08-14 2025 | 7 Essential Burp Extensions for Hacking APIs - Security Boulevard The content discusses seven essential Burp extensions for hacking APIs, focusing on enhancing security measures. These extensions are crucial tools for identifying vulnerabilities and ensuring the safety of APIs. By utilizing these extensions, security professionals can effectively test and secure APIs against potential threats and attacks. The article emphasizes the importance of using these tools to enhance the security posture of API implementations. | Burp |
| 2025-08-14 2025 | Burp Suite: The Basics TryHackMe Writeup The content is about a writeup on using Burp Suite for basic tasks on TryHackMe. Burp Suite is a popular web application testing tool used for security assessments. The writeup likely covers introductory information, tutorials, and practical exercises related to using Burp Suite in a simulated hacking environment provided by TryHackMe. This content is likely to provide insights into how to use Burp Suite effectively for testing and securing web applications. | Burp |
| 2025-08-14 2025 | https://github.com/lucsemassa/burp_bug_finder The provided link leads to a GitHub repository named "burp_bug_finder" created by user lucsemassa. The content of the repository likely contains tools or scripts related to finding bugs in the Burp Suite software. For more detailed information, it is recommended to visit the GitHub link directly. | Burp |
| 2025-08-14 2025 | Vulnerabilities detected by Burp Scanner - PortSwigger The content provided is a title mentioning vulnerabilities detected by Burp Scanner, a web vulnerability scanner developed by PortSwigger. It suggests that the focus is on identifying security weaknesses in web applications through the use of this tool. The summary lacks detailed information about specific vulnerabilities or how they are detected, but it highlights the importance of using tools like Burp Scanner to enhance the security of web applications. | Burp |
| 2025-08-14 2025 | botesjuan/Burp-Suite-Certified-Practitioner-Exam-Study The content appears to be a study guide or resource related to preparing for the Burp Suite Certified Practitioner Exam. It seems to be created by a user named botesjuan. The content likely includes information, tips, and resources to help individuals study and prepare for the certification exam. | Burp |
| 2025-08-14 2025 | xnl-h4ck3r/GAP-Burp-Extension The content is a reference to a GitHub repository named "xnl-h4ck3r/GAP-Burp-Extension." This suggests that the repository contains a Burp extension developed by the user xnl-h4ck3r. Burp extensions are typically used to enhance the functionality of the Burp Suite, a popular web application security testing tool. The extension likely provides additional features or capabilities to assist in security testing and analysis. | Burp |
| 2025-08-14 2025 | nccgroup/AutoRepeater: Automated HTTP Request Repeating With Burp Suite The content is about a tool called nccgroup/AutoRepeater, which automates the process of repeating HTTP requests using Burp Suite. This tool assists in testing and analyzing web applications by automatically repeating specific HTTP requests. It aims to streamline the process of testing and identifying vulnerabilities in web applications by automating repetitive tasks within the Burp Suite environment. | Burp |
| 2025-08-14 2025 | My First Burp Suite Extension The content is titled "My First Burp Suite Extension" and simply states that the author has created their first Burp Suite extension. The content is very brief and does not provide any further details or information about the extension or its functionality. | Burp |
| 2025-08-14 2025 | The Top 8 Burp Suite Extensions - Think outside the box The content briefly mentions the top 8 Burp Suite extensions, encouraging users to think creatively and explore beyond the standard features of the tool. It suggests that by utilizing these extensions, users can enhance their security testing capabilities and discover new ways to improve their testing processes. The emphasis is on expanding one's toolkit and considering innovative approaches to maximize the benefits of using Burp Suite. | Burp |
| 2025-08-14 2025 | Open Security Research: Extending Burp Proxy With Extensions The content discusses open security research focused on extending Burp Proxy with extensions. It likely explores the development and implementation of additional functionalities or features within Burp Proxy to enhance its capabilities for security testing and analysis. The article may delve into the benefits, methods, and potential outcomes of extending Burp Proxy through the use of extensions, aiming to provide insights and guidance for security researchers and professionals seeking to optimize their security testing tools. | Burp |
| 2025-08-14 2025 | PortSwigger Web Security Blog: Writing your first Burp Suite extension The content is about a blog post on PortSwigger Web Security that guides readers on how to write their first Burp Suite extension. It likely provides step-by-step instructions, tips, and best practices for creating custom extensions to enhance the functionality of Burp Suite, a popular web security testing tool. The blog post may cover topics such as setting up the development environment, understanding the extension architecture, and writing code to extend the capabilities of Burp Suite. It aims to help users customize their security testing workflows and improve their web application security assessments. | Burp |
| 2025-08-14 2025 | Web App Pentesting With Burp Suite Scan Profiles | White Oak The content provided lacks specific information or details to summarize. It seems to mention web application pentesting using Burp Suite scan profiles in White Oak, but without further context or details, a concise summary cannot be provided. | Burp |
| 2025-08-14 2025 | https://portswigger.net/blog/some-of-the-best-burp-extensions-as-chosen-by-you The blog discusses some of the best Burp Suite extensions chosen by users. It highlights popular extensions like Autorize, Collaborator Everywhere, and Backslash Powered Scanner. These extensions enhance Burp Suite's functionality by adding features such as automated authorization testing, improved collaboration capabilities, and advanced scanning functionalities. Users appreciate these extensions for their effectiveness in improving security testing workflows and identifying vulnerabilities. The blog aims to showcase the diverse range of extensions available for Burp Suite users to enhance their experience and maximize the tool's capabilities for web security testing. | Burp |
| 2025-08-14 2025 | Great getting started resources for new users of Burp Suite Professional | The content mentions that there are excellent resources available for new users of Burp Suite Professional. It suggests that these resources are helpful for beginners looking to get started with using the software effectively. The content seems to emphasize the availability of resources to assist new users in learning how to use Burp Suite Professional. | Burp |
| 2025-08-14 2025 | https://www.whiteoaksecurity.com/web-app-pentesting-burp-suite-scan-profile/ The content discusses how to perform web application penetration testing using Burp Suite's scan profiles. It explains the importance of scan profiles in customizing and optimizing scans for different types of web applications. The article provides a step-by-step guide on creating and configuring scan profiles in Burp Suite to enhance the efficiency and effectiveness of web application security testing. It emphasizes the significance of understanding scan profiles to tailor scans to specific testing requirements and improve the overall testing process. | Burp |
| 2025-08-14 2025 | Authentication Token Obtain and Replace (ATOR) Burp Plugin: Fast and Reliab The content is about the Authentication Token Obtain and Replace (ATOR) Burp Plugin, which is described as fast and reliable. It likely focuses on a tool or extension that aids in obtaining and replacing authentication tokens within the Burp Suite software. The plugin is designed to streamline the process of managing authentication tokens, enhancing efficiency and reliability in security testing and web application assessments. | Burp |
| 2025-08-14 2025 | BurpSuite Extensions: Some Favorites - VDA Labs The content titled "BurpSuite Extensions: Some Favorites - VDA Labs" likely discusses various favorite BurpSuite extensions recommended by VDA Labs. BurpSuite is a popular web vulnerability scanner and testing tool used by cybersecurity professionals. VDA Labs may share insights on specific extensions that enhance the functionality and capabilities of BurpSuite for security testing purposes. The article could provide valuable recommendations for users looking to optimize their experience with BurpSuite through the use of extensions vetted by VDA Labs. | Burp |
| 2025-08-14 2025 | Burp Share Requests - PortSwigger The content is concise and mentions "Burp Share Requests" by PortSwigger. This likely refers to a feature or tool related to sharing HTTP requests in Burp Suite, a popular web application security testing tool. The feature may allow users to easily share and collaborate on HTTP requests within the Burp Suite platform. | Burp |
| 2025-08-14 2025 | https://www.infosecurity-magazine.com/news/portswigger-launches-web-security/ PortSwigger has introduced a new web security product called Burp Suite Enterprise Edition. It aims to enhance web application security testing for organizations by offering scalable and collaborative features. The tool enables multiple users to work together on security testing projects, improving efficiency and collaboration. Burp Suite Enterprise Edition provides a centralized platform for managing testing activities, sharing results, and tracking progress. This product is designed to streamline the process of identifying and addressing security vulnerabilities in web applications, helping organizations strengthen their cybersecurity defenses. | Burp |
| 2025-08-14 2025 | https://github.com/snoopysecurity/awesome-burp-extensions The provided link leads to a GitHub repository named "awesome-burp-extensions" created by snoopysecurity. This repository likely contains a curated list of useful extensions for Burp Suite, a popular web application security testing tool. Users can explore and access various Burp extensions shared in this repository to enhance their security testing capabilities. | Burp |
| 2025-08-14 2025 | Using Burp to Test a REST API | Burp Suite Support Center The content is about utilizing Burp Suite to test a REST API. Burp Suite is a popular tool used for web application security testing. Testing REST APIs with Burp Suite can help identify vulnerabilities and ensure the security of the API. By using Burp Suite, testers can intercept and analyze API requests and responses, manipulate data, and detect potential security issues. This tool provides various features to assist in testing and securing REST APIs effectively. | Burp |
| 2025-08-14 2025 | https://www.kitploit.com/2018/11/aes-killer-v30-burp-plugin-to-decrypt.html?utm_source=dlvr.it&utm_medium=twitter&m=1 The content discusses AES Killer v3.0, a Burp Suite plugin designed to decrypt AES encrypted traffic in real-time. It allows security professionals to analyze encrypted traffic and identify potential vulnerabilities. The plugin can be used to decrypt HTTPS traffic and view the plaintext data for security testing purposes. This tool enhances the capabilities of Burp Suite for security researchers and penetration testers. | Burp |
| 2025-08-14 2025 | PortSwigger/param-miner The content provided is a brief mention of a tool called PortSwigger/param-miner. This tool is likely related to web security testing or web application security, as PortSwigger is known for its web security tools like Burp Suite. However, without additional context or details, it is unclear what specific functionality or purpose the PortSwigger/param-miner tool serves. | Burp |
| 2025-08-14 2025 | GitHub - nccgroup/BurpSuiteHTTPSmuggler: A Burp Suite extension to help pen The content is about a GitHub repository named "BurpSuiteHTTPSmuggler" created by nccgroup. It is a Burp Suite extension designed to assist in penetration testing. The extension likely provides tools and functionalities to help identify and exploit HTTP smuggling vulnerabilities during security assessments using the Burp Suite tool. | Burp |
| 2025-08-14 2025 | The Top 5 Burp Suite Extensions The content mentions the top 5 Burp Suite extensions. Burp Suite is a popular web vulnerability scanner used by security professionals for testing web applications. Extensions enhance its functionality by adding new features and capabilities. The top 5 extensions likely provide additional tools for security testing, automation, or customization within the Burp Suite environment. | Burp |
| 2025-08-14 2025 | SleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Po SleuthQL is a Burp Suite tool designed for parsing history to uncover potential SQL injection vulnerabilities. It aids in identifying security flaws related to SQL injection by analyzing Burp's history. | Burp |
| 2025-08-14 2025 | https://portswigger.net/web-security/sql-injection/cheat-sheet The provided link leads to a cheat sheet on SQL injection from PortSwigger, a web security resource. The cheat sheet likely contains valuable information on SQL injection techniques, syntax, and examples to help individuals understand and prevent SQL injection attacks. It serves as a quick reference guide for developers and security professionals to enhance their knowledge and protect web applications from this common vulnerability. | SQLi |
| 2025-08-14 2025 | https://www.hackingarticles.in/burp-suite-for-pentester-hackbar/ The content discusses the use of Burp Suite, a popular tool for penetration testing, and specifically focuses on the Hackbar extension. Hackbar is a simple penetration testing tool that allows users to execute JavaScript code in the browser. The article provides a detailed guide on how to install and use Hackbar within Burp Suite for various testing scenarios. It emphasizes the importance of understanding the tool's capabilities and limitations to effectively utilize it in security assessments. Overall, the content highlights the practical application of Hackbar in enhancing the functionality of Burp Suite for penetration testing purposes. | BurpXSSXXE |
| 2025-08-14 2025 | https://portswigger.net/web-security/xxe The link provided leads to a webpage discussing XML External Entity (XXE) attacks in web security. XXE attacks exploit vulnerabilities in XML parsers to access sensitive data or execute remote code. The article likely covers how XXE attacks work, their impact on web applications, and strategies to prevent them, such as disabling external entity processing or using secure XML parsers. It's important for web developers and security professionals to be aware of XXE vulnerabilities and take necessary precautions to protect their systems from potential exploitation. | XXE |
| 2025-08-14 2025 | br3akp0int/GQLParser: A repository for GraphQL Extension for Burp Suite The content is about a repository called br3akp0int/GQLParser, which offers a GraphQL Extension for Burp Suite. This extension likely provides additional functionality for the Burp Suite tool related to handling GraphQL requests and responses. The repository may contain code, documentation, or resources for integrating GraphQL capabilities into the Burp Suite tool for security testing and analysis purposes. | GraphQL |
| 2025-08-14 2025 | https://portswigger.net/research/our-favourite-community-contributions-to-the-xss-cheat-sheet The content discusses the XSS Cheat Sheet, highlighting community contributions that enhance the resource. The XSS Cheat Sheet is a valuable reference for understanding cross-site scripting vulnerabilities. The article showcases various user-generated additions to the cheat sheet, such as new payloads, evasion techniques, and attack vectors. These contributions help improve the cheat sheet's comprehensiveness and usefulness for security professionals and developers. The article emphasizes the collaborative nature of the cybersecurity community in sharing knowledge and best practices to combat XSS vulnerabilities effectively. | XSS |
| 2025-08-14 2025 | Documenting the impossible: Unexploitable XSS labs | PortSwigger Research The content is about "Unexploitable XSS labs" by PortSwigger Research. It likely discusses the challenges of documenting and dealing with XSS vulnerabilities that are deemed unexploitable. The article may explore the complexities of identifying and mitigating XSS flaws that are difficult to exploit, highlighting the importance of thorough documentation and research in cybersecurity practices. | XSS |
| 2025-08-14 2025 | (509) Find and Exploit Server-Side Request Forgery (SSRF) Using Burp Suite The content is about utilizing Burp Suite to discover and exploit Server-Side Request Forgery (SSRF) vulnerabilities. SSRF allows attackers to make requests on behalf of the server, potentially accessing sensitive data or services. Burp Suite, a popular web vulnerability scanner, can help identify SSRF vulnerabilities in web applications, enabling security professionals to address and mitigate these risks. By understanding how SSRF works and using tools like Burp Suite, security experts can enhance the protection of web applications against potential exploits. | SSRF |
| 2025-08-14 2025 | Server-Side Request Forgery (SSRF)- PortSwigger Labs | by Michael Koczwara The content is about Server-Side Request Forgery (SSRF) and is part of PortSwigger Labs. It likely discusses the concept of SSRF, which is a type of vulnerability that allows attackers to manipulate server requests from the server side. The article may cover how SSRF attacks work, their impact on security, and potential mitigation strategies. It is written by Michael Koczwara and is likely to provide insights and guidance on understanding and addressing SSRF vulnerabilities in web applications. | SSRF |
| 2025-07-12 2025 | Blind SSRF via Burp Collaborator 1 App fetches URLs (PDF gen webhook etc.) 2 Send URL pointing to Burp Collaborator 3 No visible response but OAST logs the request 4 Confirms SSRF vulnerability No output no bug #bugbounty #ssrf #burp #oast The content discusses a method for exploiting a Blind SSRF vulnerability using Burp Collaborator. It involves sending URLs to Burp Collaborator through an application that fetches URLs like PDF generation or webhooks. Despite no visible response, the Out-of-Band Application Security Testing (OAST) logs the request, confirming the SSRF vulnerability. The key takeaway is that even if there is no visible output, the presence of an SSRF vulnerability should not be overlooked. This information is relevant for bug bounty hunters and those interested in web security testing. | SSRF |
| 2025-06-28 2025 | Server-Side Bugs That Pay Big SSRF (internal request abuse) SSTI (template injection) XXE (XML Entity Injection) Log4Shell-style payloads Blind bugs with Burp Collaborator Quiet bugs massive impact. #BugBounty #SSRF #EthicalHacking #bugbountytip The content discusses lucrative server-side bugs like SSRF, SSTI, XXE, Log4Shell-style payloads, and blind bugs with Burp Collaborator. These vulnerabilities can have a significant impact and are valuable for bug bounty programs and ethical hacking. Emphasizing the importance of identifying and addressing these issues, the post highlights their potential for exploitation and the need for vigilance in cybersecurity. | SSRF |
| 2025-05-08 2025 | Completed Server-Side Vulnerabilities Learning Path at PortSwigger Thrilled to finish PortSwigger's Server-Side Vulnerabilities path gaining insight into web system exploits. #WebSecurity #CyberSec #PortSwigger #Learning #SQLInjection #SSRF #Auth #Vulns The content highlights the completion of the Server-Side Vulnerabilities Learning Path at PortSwigger, expressing excitement at gaining insights into web system exploits like SQL injection, SSRF, and authentication vulnerabilities. The individual is thrilled to finish the learning path and shares hashtags related to web security, cybersecurity, learning, and PortSwigger. | SSRF |
| 2025-04-30 2025 | #burp #pentest #ai #hackerassociate #cybersecurity #infosec… | Harshad Shah Setting Up #Burp MCP Server on Claude Desktop
#Pentest Modern App with #Ai
⇢ Learn how to set up a 𝗕𝘂𝗿𝗽 𝗠𝗖𝗣 𝗦𝗲𝗿𝘃𝗲𝗿 on your 𝗖𝗹𝗮𝘂𝗱𝗲 𝗱𝗲𝘀𝗸𝘁𝗼𝗽 in this easy-to-follow tutorial.
⇢ Get your server up and... | AIBurpTalks |
| 2025-04-03 2025 | Sticky Burp, Reusable and Replaceable Environment Variables Enables persistent sticky session handling in web application testing. | Burp |
| 2025-03-10 2025 | GitHub - vsec7/BurpSuite-Xkeys: A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage. A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage. - vsec7/BurpSuite-Xkeys | BurpSecrets |
| 2025-03-08 2025 | GitHub - trufflesecurity/trufflehog-burp-suite-extension: Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc) using TruffleHog. Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc) using TruffleHog. - trufflesecurity/trufflehog-burp-suite-... | BurpSecrets |
| 2025-02-05 2025 | SSRF: Anatomy of a Cloud Attack @ Cloud Village | @seasides_conf 2025! Join @Zero0x00 as he explores SSRF attacks with Burp Suite & AWS Metadata. A must-attend for cloud security pros! 22 Feb 2025 #CloudSecurity #SSRF #Seasides2025 The content discusses an upcoming session at the Cloud Village event at the Seasides Conference 2025, focusing on SSRF attacks using Burp Suite and AWS Metadata. Led by @Zero0x00, the session is aimed at cloud security professionals and is scheduled for February 22, 2025. It emphasizes the importance of understanding SSRF attacks in cloud security. Attendees are encouraged to join to gain insights into this critical aspect of cloud security. | SSRF |
| 2025-02-03 2025 | Nowy odcinek na YouTube! Jak działa SSRF (Server-Side Request Forgery) i jak atakujący mogą manipulować żądaniami HTTP? Sprawdź jak wykrywać i testować tę podatność! Obejrzyj teraz: #SSRF #Cybersecurity #BurpSuite #Pentesting #WebSecurity The content discusses a new YouTube episode about SSRF (Server-Side Request Forgery), explaining how attackers manipulate HTTP requests and how to detect and test this vulnerability. It invites viewers to watch the episode to learn more about SSRF, cybersecurity, BurpSuite, pentesting, and web security. The link provided directs viewers to the YouTube video. | SSRF |
| 2025-02-01 2025 | Looking for a Burp Collaborator alternative for SSRF testing? Bug bounty hunters & pentesters Interactsh is a must-have for SSRF exploitation web security and bug bounties. #BugBounty #PenetrationTesting #SSRF #HackingTools #ProjectDiscovery Interactsh is recommended as a Burp Collaborator alternative for SSRF testing by bug bounty hunters and pentesters. It is considered essential for SSRF exploitation, web security, and bug bounties. The tool is highlighted for its effectiveness in these areas and is associated with Bug Bounty, Penetration Testing, SSRF, Hacking Tools, and Project Discovery. | SSRF |
| 2025-02-01 2025 | A Burpsuite Extension For JS Reconnaissance - Jsmon The Jsmon Burpsuite extension is designed for security researchers to enhance their web security testing by integrating Jsmon's javascript scanning and monitoring capabilities directly into Burpsuite.... | BurpRecon |
| 2025-01-30 2025 | BChecks - IntelliJ IDEs Plugin | Marketplace Provides support for the BCheck language, used to provide custom scan checks for Burp Suite Professional and Burp Suite Enterprise. Key features: Syntax highlighting... | Burp |
| 2025-01-28 2025 | GitHub - IckoGZ/burp-deepseek: A quick and dirty (and a little shitty) burp extension that uses cheap deepseek api to send request and response and maybe found something interesting. A quick and dirty (and a little shitty) burp extension that uses cheap deepseek api to send request and response and maybe found something interesting. - IckoGZ/burp-deepseek | Burp |
| 2025-01-15 2025 | Blind #SSRF vulnerabilities can be detected by monitoring response times & using out-of-band techniques like DNS/HTTP callbacks. Set up a Burp Collaborator or interactsh server to catch those internal network calls. #InfoSec #BugBounty #WebSecurity Blind SSRF vulnerabilities can be identified by monitoring response times and utilizing out-of-band techniques like DNS/HTTP callbacks. Setting up a Burp Collaborator or interactsh server can help capture internal network calls. This approach enhances information security, aids in bug bounty programs, and strengthens web security measures. | SSRF |
| 2025-01-12 2025 | Quick and dirty way to find parameters vulnerable to LFI & Path Traversal & SSRF & Open Redirect: Burp Search Regex \?.=(\/\/?\w|\w\/|\w(%3A|:)(\/|%2F)|%2F|[\.\w]\.\w{24}[\w]) And find potentially vulnerable SSRF params - https://t.co/6cfBPVn0FM #SSRF #cybersec https://t.co/ipnHHHaID4 The content discusses a method using Burp Search Regex to identify parameters vulnerable to LFI, Path Traversal, SSRF, and Open Redirect. The provided regex pattern helps in finding potentially vulnerable SSRF parameters. The focus is on cybersecurity, specifically SSRF vulnerabilities. The content includes a link for further reference. | SSRF |
| 2025-01-09 2025 | Automated SSRF Detection! #BugBounty #SSRF #Regex #bugbountytips #burpsuite Prepare for success: 1 Use a DNS log platform (e.g. Burp Collaborator or https://t.co/UiHRbhDCC8). 2 Ready these regex patterns: The content discusses automated SSRF detection for bug bounty programs, emphasizing the use of a DNS log platform like Burp Collaborator and specific regex patterns. It suggests preparing for success by utilizing these tools and resources to enhance SSRF vulnerability detection. The post also includes relevant hashtags and a link to regex patterns for reference. | SSRF |
| 2024-12-31 2024 | GitHub - hackerassociate/SSRF-Hacks-IP-Decimal: A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad Shah. The content discusses a Burp Suite extension named "SSRF-Hacks-IP-Decimal" created by Harshad Shah. This tool converts IP addresses to decimal notation, aiding in SSRF bypass and WAF evasion testing. It is available on GitHub under the hackerassociate repository. The extension is designed to assist in security testing by converting IP addresses for specific testing scenarios. | BurpSSRF |
| 2024-12-16 2024 | socalledhacker: Don't want to use Burpsuite collaborator for SSRF hunting... Check this out an amazing replacement of collaborator:- #bugbounty #bug #bugbountytip #bugbountytips @cybersecurity #infosec #SSRF The content shared by socalledhacker discusses an alternative to using Burpsuite collaborator for SSRF hunting. The post highlights a replacement tool and encourages users to explore it. The hashtags used indicate the focus on bug bounty, cybersecurity, infosec, and SSRF. The post is shared on Twitter by socalledhacker. | SSRF |
| 2024-12-12 2024 | API Testing with Insomnia and Burp Suite: An Alternative to Postman Learn how to use Insomnia and Burp Suite for API testing and hacking as a powerful alternative to Postman. Set up Insomnia, capture API requests with mitmproxy, convert them to OpenAPI 3.0 format, and... | API SecBurp |
| 2024-12-03 2024 | burp-extensions-montoya-api-examples/customlogger/src/main/java/example/customlogger/MyTableModel.java at main · PortSwigger/burp-extensions-montoya-api-examples Examples for using the Montoya API with Burp Suite - PortSwigger/burp-extensions-montoya-api-examples | Burp |
| 2024-12-03 2024 | Hacking API discovery with a custom Burp extension Learn how to improve your API discovery with a custom Burp Suite extension dedicated to automatically finding API document artifacts for you. | API SecBurp |
| 2024-12-03 2024 | Burp-Montoya-Utilities/src/main/java/com/coreyd97/BurpExtenderUtilities/PopOutPanel.java at master · CoreyD97/Burp-Montoya-Utilities The content refers to a repository named "Burp-Montoya-Utilities" containing a Java file called "PopOutPanel.java" by CoreyD97. It offers utilities for creating extensions using Burp's Montoya API. This repository is a resource for developers looking to enhance Burp Suite functionality. | Burp |
| 2024-11-25 2024 | burp-extensions-montoya-api-examples/collaborator/src/main/java/example/collaborator/CollaboratorExample.java at main · PortSwigger/burp-extensions-montoya-api-examples · GitHub Examples for using the Montoya API with Burp Suite - PortSwigger/burp-extensions-montoya-api-examples | Burp |
| 2024-11-25 2024 | burp-extensions-montoya-api-examples/customscanchecks/src/main/java/example/customscanchecks/MyScanCheck.java at main · PortSwigger/burp-extensions-montoya-api-examples · GitHub Examples for using the Montoya API with Burp Suite - PortSwigger/burp-extensions-montoya-api-examples | Burp |
| 2024-11-19 2024 | Joyerz5: Just Discovered a Cool SSRF!! Now working to make it Impactful!! Any tips guys? How I Found it? On the Image Upload features there was fetch image from URL guess what? Yes I put burp collaborator Link there and got HTTP DNS response back! It is confirm now! #ssrf #bugbounty The content describes a cybersecurity enthusiast, Joyerz5, who discovered a Server-Side Request Forgery (SSRF) vulnerability while testing an image upload feature. By inserting a Burp Collaborator link, they received an HTTP DNS response, confirming the SSRF. Joyerz5 is now seeking tips to maximize the impact of this finding, indicating involvement in bug bounty programs. The post highlights the importance of identifying and exploiting vulnerabilities like SSRF for security testing and rewards. | SSRF |
| 2024-10-05 2024 | Mindmap/Burp Suite/Burp Suite Normal.png at main · Ignitetechnologies/Mindmap This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them - Ignitetechnologies/Mindmap | Burp |
| 2024-10-03 2024 | Automate your API hacking with Autorize Learn how to find authorization and authentication vulnerabilities in APIs using Burp and Autorize. | API SecAuthNAuthZ |
| 2024-10-03 2024 | Top 10 Browser Extensions Every Bug Bounty Hunter Needs As bug bounty hunters, we need to save time by avoiding constant switching between the terminal, multiple tabs, Burp Suite (including… | Bug BountyBurp |
| 2024-09-21 2024 | Proving API exploitability with Burp Collaborator Learn how to prove API exploitability through the use of the Burp Collaborator for out-of-band application security testing (OAST). | API SecBurp |
| 2024-09-16 2024 | PyCript: Burp Suite extension that allows for bypassing client-side encryption Pycript is a Burp Suite extension that enables users to encrypt and decrypt requests for manual and automated application penetration testing. | BurpPython |
| 2024-09-04 2024 | @SandroBruscino: Learn how attackers bypass URL validation in SSRF attacks! PortSwigger's latest cheat sheet reveals key techniques. "Understanding these flaws is critical for defending web apps." #CyberSecurity #SSRF #WebSecurity The content discusses how attackers bypass URL validation in SSRF attacks, with PortSwigger's cheat sheet revealing key techniques. Understanding these flaws is crucial for defending web apps. The post emphasizes the importance of cybersecurity, SSRF, and web security. Sandro Bruscino's tweet highlights the significance of recognizing and preventing vulnerabilities in web applications to enhance cybersecurity measures. | SSRF |
| 2024-08-30 2024 | GitHub - e1abrador/Burp-Encode-IP: Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist. Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist. - e1abrador/Burp-Encode-IP | Burp |
| 2024-08-22 2024 | BChecks/vulnerability-classes/injection at main · PortSwigger/BChecks · GitHub BChecks collection for Burp Suite Professional and Burp Suite Enterprise Edition - PortSwigger/BChecks | BurpRCESQLiXSS |
| 2024-08-16 2024 | Rajan22m: I completed the Web Security Academy lab: SSRF with blacklist-based input filter @WebSecAcademy #portswigger #websecurity #lab #hacking #ethicalhacker #ethicalhacking #bug #bugbountytips #ssrf #server Rajan22m completed the Web Security Academy lab on SSRF with a blacklist-based input filter. The post includes hashtags related to web security, hacking, ethical hacking, bug bounty tips, SSRF, and servers. The completion of this lab likely signifies Rajan22m's progress and expertise in web security and ethical hacking. | SSRF |
| 2024-08-16 2024 | GitHub - 0x999-x/jsluicepp: jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic using the CLI tool jsluice jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic using the CLI tool jsluice - 0x999-x/jsluicepp | Burp |
| 2024-08-14 2024 | basu_banakar: Thread On: Testing for Blind/Non-Blind SSRFs using redirection in integrations where there are some filters. #bugbountytips #BugBounty #ssrf #bugbountytips 1. Hit the integration by using burp collaborator by using random credentials. The content discusses testing for Blind/Non-Blind SSRFs using redirection in integrations with filters. The suggestion is to test by hitting the integration with Burp collaborator using random credentials. The post is shared on Twitter by basu_banakar. The focus is on bug bounty tips related to SSRF vulnerabilities. | SSRF |
| 2024-08-03 2024 | Testing Handbook - Burp Watch the recording Testing Handbook: Burp Suite Professional https://appsec.guide | BurpTalks |
| 2024-08-03 2024 | Mastering Web Research with Burp Suite Mastering Web Research with Burp Suite | Burp |
| 2024-08-03 2024 | Beyond the Limit: Expanding single-packet race condition with a first sequence sync for breaking the 65,535 byte limit Introduction Hello, I’m RyotaK (@ryotkak ), a security engineer at Flatt Security Inc.
In 2023, James Kettle of PortSwigger published an excellent paper titled Smashing the state machine: the true pot... | Fuzzing |
| 2024-08-02 2024 | GitHub - synacktiv/HopLa: HopLa Burp Suite Extender plugin - Adds autocompletion support and useful payloads in Burp Suite The GitHub repository "synacktiv/HopLa" offers the HopLa Burp Suite Extender plugin, enhancing Burp Suite with autocompletion support and useful payloads. This tool is designed to improve efficiency and effectiveness when testing web applications for security vulnerabilities. | Burp |
| 2024-07-31 2024 | Extending Burp Suite for fun and profit - The Montoya way - Part 5 - hn security Setting up the environment + Hello […] | Burp |
| 2024-07-30 2024 | Here's how I get the most out of Burp Suite reporting Learn how to get the most out of the reporting capabilities built into PortSwigger's Burp Suite Professional. | Burp |
| 2024-07-30 2024 | JS Link Finder Burp Suite Extension Guide Improve your bug bounty hunting, pentesting, and appsec skills with the JS Link Finder Burp Suite Extension. Discover hidden endpoints and… | Bug BountyBurp |
| 2023-12-06 2023 | videos[1] = "GAP Burp Extension" videos[1] = "GAP Burp Extension" https://www.youtube.com/watch?v=Os3bN0zUROA | Burp |
| 2023-11-03 2023 | Burp Suite Shorts | Automatic Session Handling The content is a video titled "Burp Suite Shorts | Automatic Session Handling" available on YouTube. It likely provides a concise tutorial or demonstration on how to utilize automatic session handling within the Burp Suite tool. This feature can streamline the process of managing and maintaining sessions during security testing and web application assessments. Viewers can expect to learn how to automate session handling tasks to enhance efficiency and effectiveness in their security testing workflows. | AuthNBurp |
| 2023-11-03 2023 | Burp Suite Shorts | Automatic Session Handling Burp Suite Shorts | Automatic Session Handling https://www.youtube.com/watch?v=yoENNJjC4NY | AuthNBurp |
| 2023-10-29 2023 | PortSwigger/BChecks: BChecks collection for Burp Suite Professional BChecks collection for Burp Suite Professional . Contribute to PortSwigger/BChecks development by creating an account on GitHub. | Burp |
| 2023-10-13 2023 | Understanding File Upload Vulnerabilities in Web App Penetration Testing | 2023 Understanding File Upload Vulnerabilities in Web App Penetration Testing | 2023 https://ift.tt/8aVoHYJ | RCE |
| 2023-09-15 2023 | burp.IBurpExtenderCallbacks java code examples burp.IBurpExtenderCallbacks java code examples https://ift.tt/je1FMoP | Burp |
| 2023-09-03 2023 | Proxying Burp Traffic through VPS using SOCKS Proxy Tunnel your BurpSuite traffic through VPS to bypass restrictions using SOCKS proxy. | Burp |
| 2023-08-13 2023 | Swing in Python Burp Extensions - Part 1 The content discusses using Swing in Python for developing Burp extensions. It is part 1 of a series and provides insights into integrating Swing, a GUI toolkit, with Python to create user interfaces for Burp Suite extensions. The article likely covers the basics of Swing, its benefits for creating interactive interfaces, and how it can be utilized within the context of Burp Suite extension development. | BurpPython |
| 2023-08-03 2023 | Proxying MetaSploit through BurpSuite Proxying MetaSploit through BurpSuite https://ift.tt/ZHsxq1m | Burp |
| 2023-07-02 2023 | DNS Analyzer - Finding DNS vulnerabilities with Burp Suite DNS Analyzer - Finding DNS vulnerabilities with Burp Suite https://ift.tt/a9OyrE2 | BurpRecon |
| 2023-06-17 2023 | Web Application Hacking with Burp Suite Web Application Hacking with Burp Suite https://ift.tt/I6xB4Cg | Burp |
| 2023-05-29 2023 | RepeaterSearch RepeaterSearch https://ift.tt/oKX6Ysp | Burp |
| 2023-04-13 2023 | How to use Burp Suite Like a PRO? How to use Burp Suite Like a PRO? https://ift.tt/fbstnRg | Burp |
| 2023-04-09 2023 | aress31/burpgpt aress31/burpgpt https://ift.tt/mzKofw7 | AIBurp |
| 2023-02-17 2023 | Burp Suite Extensions Rarely Utilized but Quite Useful The content discusses the underutilization of Burp Suite extensions despite their usefulness. It highlights that these extensions can enhance the functionality of Burp Suite, aiding in various security testing tasks. The article likely delves into the benefits of utilizing these extensions, such as improving efficiency, expanding capabilities, and enhancing the overall experience of using Burp Suite for security testing purposes. Overall, it emphasizes the value of exploring and incorporating these extensions into one's workflow to maximize the potential of Burp Suite. | Burp |
| 2023-02-16 2023 | A Step-by-Step Guide to Writing Extensions for API Pentesting in BurpSuite The content provides a detailed guide on creating extensions for API pentesting in BurpSuite. It likely covers step-by-step instructions on how to develop custom tools or scripts to enhance API security testing within the BurpSuite platform. This guide can help users understand the process of extending BurpSuite's capabilities for API pentesting, potentially improving their testing efficiency and effectiveness. | Burp |
| 2022-10-13 2022 | Server-Side Request Forgery (SSRF)- PortSwigger Labs The content discusses Server-Side Request Forgery (SSRF) as presented by PortSwigger Labs. SSRF is a vulnerability that allows attackers to manipulate a server into making requests on their behalf. This can lead to unauthorized access to internal systems, data theft, or server exploitation. Understanding SSRF is crucial for developers and security professionals to prevent such attacks and secure their systems. The link provided likely offers further details or resources on SSRF from PortSwigger Labs. | SSRF |
| 2022-06-20 2022 | Favorite tweet by @Burp_Suite Favorite tweet:
Burp Suite 2022.6 released to the Early Adopter channel. Includes grouped tabs for Repeater, connection reuse for HTTP/1 requests, and new preset scan modes. Also introduces the abili... | BurpXSS |
| 2022-06-20 2022 | Favorite tweet by @PortSwigger Favorite tweet:
Finding Client-Side Prototype Pollution (CSPP) with DOM Invader by @garethheyes - now available on the Early Adopter channel https://t.co/ut1Buup1so
— PortSwigger (@PortSwigger) Jun ... | Burp |
| 2022-04-20 2022 | Favorite tweet by @Jhaddix Favorite tweet:
Asking for a friend: What's the current best low-cost, self-study, Burp Suite training out there?
— Jason Haddix (@Jhaddix) Apr 19, 2022 | Burp |
| 2022-04-14 2022 | Favorite tweet by @e11i0t_4lders0n Favorite tweet:
Burp Extension for XSS Thread 🧵 #bugbounty #bugbountytip #bugbountytips
— Tushar Verma 🇮🇳 (@e11i0t_4lders0n) Apr 14, 2022 | Bug BountyBurpXSS |
| 2022-03-21 2022 | Favorite tweet by @cedoxX Favorite tweet:
Nuclei-Burp-Plugin - A @Burp_Suite plugin intended to help with Nuclei template generation. https://t.co/wseZPcgBE0 @KitPloit #RedTeam #Tools #Cyber #Hacker #BugBounty #Hacking https:... | Burp |
| 2022-03-06 2022 | Favorite tweet by @fardeenahmed411 Favorite tweet:
Top 10 essential tools for Bug-Bounty Hunting : 1. Burp Suite / ZAP-Proxy 2. Google Dorking Script 3. DNS-Discovery 4. Reverse IP Lookup 5. Wapiti 6. INalyzer 7. IronWASP 8. Wfuzz 9. ... | Bug BountyBurpRecon |
| 2022-03-02 2022 | Favorite tweet by @ptracesecurity Favorite tweet:
Nuclei-Burp Extension: run nuclei scanner directly from burp https://t.co/5eXxgjapf7 #Pentesting #BurpSuite #WebSecurity #Infosec https://t.co/xwhsoQfhRo
— Ptrace Security GmbH (@ptr... | Burp |
| 2022-01-05 2022 | 0xInfection/XSRFProbe 0xInfection/XSRFProbe | CSRF |
| 2022-01-03 2022 | BUG BOUNTY HUNTING WITH BURP SUITE BUG BOUNTY HUNTING WITH BURP SUITE | Bug BountyBurp |
| 2021-11-22 2021 | Burp Suite for Pentester: Software Vulnerability Scanner & Retire.js Burp Suite for Pentester: Software Vulnerability Scanner & Retire.js | Burp |
| 2021-10-29 2021 | Improvements to Burp Suite authenticated scanning Improvements to Burp Suite authenticated scanning | AuthZBurp |
| 2021-08-30 2021 | Web App Pentesting With Burp Suite Scan Profiles | White Oak The content discusses the importance of efficient web application pentesting using Burp Suite's Config Library and scan profiles. It highlights how these tools can enhance the testing process and improve results. White Oak Security's blog emphasizes the significance of utilizing scan profiles to streamline the testing procedure and maximize the effectiveness of the pentesting tool. | Burp |
| 2021-08-30 2021 | Web App Pentesting With Burp Suite Scan Profiles The content focuses on web application penetration testing using Burp Suite scan profiles. Burp Suite is a popular tool for assessing web application security. Scan profiles in Burp Suite help customize and optimize the scanning process for different types of vulnerabilities. By utilizing scan profiles effectively, security professionals can efficiently identify and address security issues in web applications. | Burp |
| 2021-08-25 2021 | Burp Suite for Pentester: Repeater Burp Suite for Pentester: Repeater | Burp |
| 2021-08-21 2021 | Why u should use burp to test Path Traversal Vulnerability and also get RXSS Why u should use burp to test Path Traversal Vulnerability and also get RXSS | BurpXSS |
| 2021-06-05 2021 | Automating Burp Suite -4 | Understanding And Customising Custom Header From The content discusses the creation of a Burp Extension using Jython to automate Burp Suite tasks. Specifically, it focuses on adding custom headers to requests. This is the fourth tutorial in the series, emphasizing understanding and customizing custom headers. The tutorial likely provides step-by-step instructions on how to implement this feature within Burp Suite for automated testing and customization purposes. | Burp |
| 2021-04-22 2021 | Web App Pentesting With Burp Suite Scan Profiles | White Oak The blog by White Oak Security discusses efficient web application pentesting using Burp Suite's Config Library and scan profiles. It highlights the importance of using these tools to enhance testing capabilities. By utilizing scan profiles, testers can streamline their processes and improve the effectiveness of their assessments. The blog emphasizes the significance of proper tool utilization in enhancing the overall testing experience and outcomes. | Burp |
| 2020-12-03 2020 | My First Burp Suite Extension The content discusses the author's transition from defensive to offensive security roles, requiring new skill development. They introduce their first Burp Suite extension, a tool for testing web applications. Burp Suite is highlighted as a valuable security tool. | Burp |
| 2020-05-30 2020 | BurpSuite Extensions: Some Favorites - VDA Labs The content mentions a list of favorite BurpSuite extensions curated by VDA Labs. It likely discusses various useful extensions that can enhance the functionality of BurpSuite, a popular web application security testing tool. The article may provide insights into specific extensions that can improve the efficiency and effectiveness of security testing processes within BurpSuite. | Burp |
| 2020-02-25 2020 | doyensec/graph-ql: GraphQL Security Research Material The content refers to a GitHub repository called doyensec/inql, which is an extension for the Burp Suite tool designed for testing the security of GraphQL APIs. The tool, named InQL, is specifically created for conducting security assessments on GraphQL endpoints. It aims to assist in identifying and addressing potential security vulnerabilities in GraphQL implementations. | GraphQL |
| 2019-11-14 2019 | PortSwigger Launches Web Security Academy PortSwigger has introduced the Web Security Academy to address the shortage of cybersecurity skills. The platform, created by the makers of Burp Suite, offers interactive training to enhance web security knowledge. This initiative aims to equip individuals with the necessary skills to combat cyber threats effectively. | Burp |
| 2019-08-23 2019 | How i exploit out-of-band resource load (HTTP) using burp suite extension plugin (taborator) The content discusses exploiting out-of-band resource load using a Burp Suite extension plugin called Taborator. It focuses on the background of the issue, likely related to leveraging HTTP requests to manipulate or extract data from a target system. The use of Burp Suite, a popular web vulnerability scanner, in combination with the Taborator plugin suggests a method for identifying and potentially exploiting vulnerabilities related to out-of-band resource loading. This technique could be used for security testing and identifying weaknesses in web applications. | Burp |
| 2019-03-10 2019 | The Top 5 Burp Suite Extensions The content provided is very brief and lacks information on the top 5 Burp Suite extensions. It only mentions the location of the developer and author, who is based in Austin, TX. The main point is that the author is associated with Burp Suite extensions, but specific details about the extensions themselves are missing. | Burp |
| 2018-11-08 2018 | AES-Killer v3.0 - Burp Plugin To Decrypt AES Encrypted Traffic Of Mobile Apps On The Fly AES-Killer v3.0 is a Burp plugin designed to decrypt AES encrypted traffic from mobile apps in real-time. This tool allows for the decryption of encrypted data on the fly, aiding in the analysis of mobile app traffic for security testing and debugging purposes. | Burp |
| 2018-06-08 2018 | SleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Po SleuthQL is a tool designed to parse Burp history and identify potential SQL injection points. It aims to assist in discovering vulnerabilities related to SQL injection by analyzing requests and responses within Burp Suite. This tool is useful for security professionals and researchers looking to enhance their testing capabilities and identify potential weaknesses in web applications. | Burp |
| 2017-03-07 2017 | PortSwigger Web Security Blog: Adapting AngularJS Payloads to Exploit Real The PortSwigger Web Security Blog discusses the challenges of exploiting AngularJS Template Injection in XSS attacks. Experienced pentesters face obstacles like filtering, encoding, browser quirks, and WAFs. Adapting AngularJS payloads to bypass these defenses is crucial for successful exploitation. | XSS |
| 2017-03-07 2017 | PortSwigger Web Security Blog: XSS without HTML: Client-Side Template Injec The PortSwigger Web Security Blog discusses how the widespread use of AngularJS can lead to Angular Template Injection vulnerabilities on websites. This issue is a less recognized form of server-side template injection. The blog highlights the risks associated with naive implementation of AngularJS, emphasizing the importance of understanding and mitigating such vulnerabilities to protect websites from exploitation. | XSS |
| 2016-12-28 2016 | The Top 8 Burp Suite Extensions - Think outside the box The content is a title mentioning the top 8 Burp Suite extensions and encourages thinking outside the box when using these tools. It suggests that these extensions can enhance the functionality of Burp Suite, a popular web application security testing tool. The focus is on exploring innovative ways to utilize these extensions to improve security testing processes. | Burp |
sqlmap sqlmap.org #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | SQLMap Tamper Collection: Modern WAF Bypass Scripts (Cloudflare, AWS, Azure) SQLMap Tamper Collection: Modern WAF Bypass Scripts (Cloudflare, AWS, Azure) | SQLi |
| 2026-04-22 2026 | Pentesting PostgreSQL with SQL Injections Pentesting PostgreSQL with SQL Injections | SQLi |
| 2026-04-22 2026 | CVE-2025-52694 PoC: Critical SQL Injection in Advantech IoTSuite/SaaS-Composer CVE-2025-52694 PoC: Critical SQL Injection in Advantech IoTSuite/SaaS-Composer | SQLi |
| 2026-04-22 2026 | MCP Vulnerability Case Study: SQL Injection in the Postgres MCP Server MCP Vulnerability Case Study: SQL Injection in the Postgres MCP Server | SQLi |
| 2026-04-22 2026 | BWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL Injections BWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL Injections | SQLi |
| 2026-04-17 2026 | Discovering GraphQL endpoints and SQLi vulnerabilities Discovering GraphQL endpoints and SQLi vulnerabilities | GraphQL |
| 2026-04-17 2026 | HackerOne Report #435066: SQL injection in GraphQL endpoint HackerOne Report #435066: SQL injection in GraphQL endpoint | GraphQL |
| 2026-04-16 2026 | SQLMap Cheat Sheet: Commands, Options, and Advanced Features SQLMap Cheat Sheet: Commands, Options, and Advanced Features | SQLi |
| 2026-04-15 2026 | SAP Security Patch Day April 2026: Critical Vulnerabilities CVSS 9.9 SQL Injection and Authorization Risks SAP Security Patch Day April 2026: Critical Vulnerabilities, CVSS 9.9 SQL Injection, and Authorization Risks https://erp.today/sap-security-patch-day-april-2026-vulnerabilities/ | SQLi |
| 2026-04-15 2026 | FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion https://ift.tt/ENselVr | SQLi |
| 2026-04-14 2026 | CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks https://ift.tt/HrQnkXP | SQLi |
| 2026-04-14 2026 | SAP Patch Day Fixes Critical SQL Injection DoS and Code Injection Flaws SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws https://ift.tt/wOQTGjW | SQLi |
| 2026-04-14 2026 | SAP Patch Day Fixes Critical SQL Injection DoS and Code Injection Flaws SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws https://ift.tt/lgQwt4L | SQLi |
| 2026-04-14 2026 | CISA Warns of Fortinet SQL Injection Flaw Actively Exploited in Attacks CISA Warns of Fortinet SQL Injection Flaw Actively Exploited in Attacks https://ift.tt/kN2acMA | SQLi |
| 2026-04-14 2026 | CISA Warns Fortinet SQL Injection Flaw Is Being Actively Exploited CISA Warns Fortinet SQL Injection Flaw Is Being Actively Exploited https://ift.tt/3sSd5jK | SQLi |
| 2026-04-14 2026 | SAP Patch Day Fixes Critical SQL Injection DoS and Code Injection Flaws SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws https://ift.tt/QS2AJx7 | SQLi |
| 2026-04-11 2026 | 400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw 400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw https://ift.tt/IQKLFnZ | SQLi |
| 2026-04-11 2026 | SQL injection vulnerabilities in Owncloud Android app SQL injection vulnerabilities in Owncloud Android app | Mobile |
| 2026-04-10 2026 | SQL Injection in 2026: It Took One Apostrophe SQL Injection in 2026: It Took One Apostrophe | SQLi |
| 2026-04-10 2026 | Advanced SQL Injection Techniques in Modern Web Apps Advanced SQL Injection Techniques in Modern Web Apps | SQLi |
| 2026-04-10 2026 | Bypassing WAF with Adversarial SQL Bypassing WAF with Adversarial SQL | SQLi |
| 2026-04-10 2026 | WAF Bypass Using JSON-Based SQL Injection Attacks WAF Bypass Using JSON-Based SQL Injection Attacks | SQLi |
| 2026-04-10 2026 | SQL Injection Security Vulnerabilities SQL Injection Security Vulnerabilities | SQLi |
| 2026-04-10 2026 | CVE Search: SQL Injection CVE Search: SQL Injection | SQLi |
| 2026-04-10 2026 | SQL Injection - OWASP SQL Injection - OWASP | SQLi |
| 2026-04-10 2026 | CVE-2026-26116: SQL Server SQL Injection CVE-2026-26116: SQL Server SQL Injection | SQLi |
| 2026-04-09 2026 | Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks https://ift.tt/3WzZLD8 | AI |
| 2026-04-09 2026 | Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation Attacks Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation Attacks https://ift.tt/7D4rhpX | SQLi |
| 2026-04-09 2026 | Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation https://ift.tt/fMHBmC1 | SQLi |
| 2026-04-09 2026 | Multiple SonicWall Flaws Enable SQL Injection and Privilege Escalation Attacks Multiple SonicWall Flaws Enable SQL Injection and Privilege Escalation Attacks https://ift.tt/IWwTAuM | SQLi |
| 2026-04-06 2026 | Bug Bounty Bootcamp #29: Boolean Blind SQL Injection Part 2 Bug Bounty Bootcamp #29: Boolean Blind SQL Injection Part 2 | SQLi |
| 2025-08-14 2025 | https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/ The content discusses website penetration testing and database hacking using SQLmap. It covers the importance of penetration testing to identify vulnerabilities, the process of using SQLmap for database hacking, and steps to perform SQL injection attacks. The article emphasizes the ethical use of these techniques for security testing and highlights the risks associated with unauthorized hacking. It provides insights into the tools and methods used in penetration testing and database hacking, aiming to enhance cybersecurity awareness and skills. | Bug Bounty |
| 2025-08-14 2025 | https://vavkamil.cz/2019/10/09/understanding-the-full-potential-of-sqlmap-during-bug-bounty-hunting/ The content discusses maximizing the potential of SQLmap during bug bounty hunting. It covers the importance of understanding SQL injection vulnerabilities, using SQLmap effectively, and customizing its options for better results. The article emphasizes the significance of proper reconnaissance, parameter identification, and evasion techniques to enhance the success rate of SQL injection attacks. It also provides insights into exploiting blind SQL injection vulnerabilities and leveraging SQLmap's advanced features to automate the detection and exploitation process. Overall, the content aims to help bug bounty hunters utilize SQLmap efficiently for discovering and exploiting SQL injection vulnerabilities. | Bug BountySQLi |
| 2024-11-13 2024 | SQLMap Command Generator SQLMap Command Generator | SQLi |
| 2023-09-22 2023 | How to turn SQL injection into an RCE or a file read? Case study of 128 bug bounty reports How to turn SQL injection into an RCE or a file read? Case study of 128 bug bounty reports https://www.youtube.com/watch?v=ClnVdYf4PK0 | RCETalks |
| 2023-06-08 2023 | Test website for SQL injection vulnerabilities using Python Test website for SQL injection vulnerabilities using Python https://ift.tt/msKlYeM | Python |
| 2022-04-09 2022 | Favorite tweet by @Jhaddix Favorite tweet:
4/8/22 #bugbountydiary #bugbountytips Everyone is sick in the house but I had some running scans I needed to check up on. I found a SQL injection bug on a blog. Here's how I did it, s... | Bug Bounty |
| 2022-01-16 2022 | How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes | FuzzingSQLi |
| 2021-04-16 2021 | DVWA 1.9+: Blind SQL Injection with SQLMap The content discusses performing Blind SQL Injection on DVWA 1.9+ using SQLMap. It follows a previous article on manual SQL Injection with OWASP ZAP. The focus is on hacking DVWA through Blind SQL Injection techniques. | SQLi |
| 2021-01-23 2021 | https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/ The content discusses website penetration testing and database hacking using a tool called SQLMap. It covers the process of identifying vulnerabilities in websites, exploiting them to gain unauthorized access to databases, and extracting sensitive information. The article provides a step-by-step guide on how to perform these tasks using SQLMap, a popular tool for automated SQL injection and database takeover. It emphasizes the importance of ethical hacking practices and the need for organizations to secure their websites and databases against potential cyber threats. | SQLi |
| 2020-04-17 2020 | SQL Injection Cheat Sheet by Netsparker The SQL Injection Cheat Sheet by Netsparker is a comprehensive guide detailing various forms of the SQL injection vulnerability. It serves as a valuable technical resource for understanding and addressing SQLi risks effectively. | SQLi |
| 2019-12-29 2019 | https://medium.com/bugbountywriteup/sql-injection-time-and-boolean-based-27239b6a55e8?source=twitterShare-1764222123d3-1576594710&_referrer=twitter&_branch_match_id=732557985002302401 The content discusses SQL injection vulnerabilities, specifically focusing on time-based and boolean-based techniques. It explains how attackers can exploit these vulnerabilities to manipulate database queries and gain unauthorized access to sensitive information. The article likely provides examples, explanations, and possibly mitigation strategies for preventing SQL injection attacks. | SQLi |
| 2019-11-17 2019 | Understanding the full potential of sqlmap during bug bounty hunting The content discusses utilizing sqlmap, a tool for detecting and exploiting SQL injection vulnerabilities, in bug bounty hunting and ethical hacking for offensive website security. It emphasizes understanding the full potential of sqlmap to effectively identify and exploit vulnerabilities. The focus is on leveraging this tool to enhance security testing efforts and maximize the outcomes of bug bounty programs. | Bug BountySQLi |
| 2019-10-05 2019 | SQL injection to RCE The content discusses a case of SQL injection leading to Remote Code Execution (RCE) discovered during a recent customer penetration testing exercise. The author will detail the scenario in the following lines. | RCESQLi |
| 2018-07-29 2018 | Making a Blind SQL Injection a Little Less Blind The content discusses the author's experience finding a SQL Injection bug despite the belief that manual SQL Injections are no longer common. The author aims to shed light on this issue and shares insights on how to make a Blind SQL Injection less challenging. | SQLi |
| 2018-07-19 2018 | Comprehensive Guide to Sqlmap (Target Options) The article discusses the "target commands" in sqlmap, a tool for SQL injection attacks. These commands are used to specify the target website or application for the attack. Understanding and utilizing these commands effectively is crucial for successful SQL injection testing. | SQLi |
| 2018-01-11 2018 | SQL Injection Wiki The SQL Injection Wiki is a comprehensive resource for understanding, exploiting, and escalating SQL injection vulnerabilities in different Database Management Systems. It serves as a valuable tool for individuals looking to learn more about SQL injection attacks and how to effectively exploit them. | SQLi |
nuclei github.com/projectdiscovery #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-17 2026 | Recon-Script: automation with Nuclei (s1d6point7bugcrowd) Recon-Script: automation with Nuclei (s1d6point7bugcrowd) | Recon |
| 2026-04-17 2026 | The Ultimate Guide to Finding Bugs With Nuclei (ProjectDiscovery) The Ultimate Guide to Finding Bugs With Nuclei (ProjectDiscovery) | Recon |
| 2026-04-17 2026 | Automate Your Nuclei Recon Pipeline with VPN + Discord Alerts Automate Your Nuclei Recon Pipeline with VPN + Discord Alerts | Recon |
| 2026-04-16 2026 | From Recon to Sensitive Key Exposure Using Nuclei From Recon to Sensitive Key Exposure Using Nuclei | Recon |
| 2026-04-16 2026 | Automating Bug Bounties with Nuclei Automating Bug Bounties with Nuclei | Bug Bounty |
| 2026-04-16 2026 | Advanced Techniques & Use Cases of Nuclei for Bug Bounty Advanced Techniques & Use Cases of Nuclei for Bug Bounty | Bug Bounty |
| 2025-08-14 2025 | NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open NucleiFuzzer is an automation tool designed to detect vulnerabilities like XSS, SQLi, SSRF, and Open. It is powerful and efficient in identifying these security issues. | FuzzingSQLiSSRFXSS |
| 2025-08-14 2025 | NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open "NucleiFuzzer is an automation tool designed to detect vulnerabilities like XSS, SQLi, SSRF, and Open. It offers powerful capabilities for automated security testing." | SSRF |
| 2025-05-22 2025 | New CVE : CVE-2025-4123 Grafana open redirect XSS/SSRF via path traversal Detect it now with Nuclei template #infosec #cve #nuclei #grafana #ssrf #xss #openredirect A new CVE, CVE-2025-4123, highlights a vulnerability in Grafana that allows open redirect, XSS, and SSRF via path traversal. The issue can be detected using Nuclei template. The post emphasizes the importance of addressing this security concern in Grafana. #infosec #cve #nuclei #grafana #ssrf #xss #openredirect. | SSRF |
| 2024-09-26 2024 | Simplifying XSS Detection with Nuclei - A New Approach XSS (Cross-Site Scripting) detection has long been a challenge, balancing accuracy with avoiding excessive false positives. Traditionally, this meant creating specific reflection based string matchers... | XSS |
| 2024-09-18 2024 | Cybersleuth254: Found an SSRF vulnerability using a custom Nuclei template! This bug allows attackers to inject malicious URLs and access sensitive data on the server. #Cybersecurity #SSRF #BugBounty #PenTesting #Infosec #Nuclei Cybersleuth254 discovered an SSRF vulnerability using a custom Nuclei template, enabling attackers to inject malicious URLs and access sensitive server data. The finding highlights the importance of cybersecurity measures like bug bounties, penetration testing, and information security. #Cybersecurity #SSRF #BugBounty #PenTesting #Infosec #Nuclei. | SSRF |
| 2024-09-18 2024 | Cybersleuth254: Found an SSRF vulnerability using a custom Nuclei template! This bug allows attackers to inject malicious URLs and access sensitive data on the server. Always validate inputs to prevent these threats! #Cybersecurity #SSRF #BugBounty #PenTesting #Infosec #Nuclei Cybersleuth254 discovered an SSRF vulnerability using a custom Nuclei template, enabling attackers to inject malicious URLs and access sensitive server data. The importance of input validation to prevent such threats is emphasized. The post highlights cybersecurity, SSRF, bug bounty, penetration testing, and Nuclei. | SSRF |
| 2023-08-11 2023 | The Ultimate Guide to Finding Bugs With Nuclei The Ultimate Guide to Finding Bugs With Nuclei https://ift.tt/0ODZ7up | Bug Bounty |
| 2022-03-02 2022 | Favorite tweet by @ptracesecurity Favorite tweet:
Nuclei-Burp Extension: run nuclei scanner directly from burp https://t.co/5eXxgjapf7 #Pentesting #BurpSuite #WebSecurity #Infosec https://t.co/xwhsoQfhRo
— Ptrace Security GmbH (@ptr... | Recon |
| 2022-01-10 2022 | Nuclei Templates Nuclei Templates | FuzzingRecon |
| 2022-01-10 2022 | Install Nuclei Install Nuclei | FuzzingRecon |
| 2021-12-01 2021 | DevSecOps part 3: Scanning Live Web Applications with Nuclei DevSecOps part 3: Scanning Live Web Applications with Nuclei | API SecRecon |
| 2021-11-24 2021 | Install Nuclei Install Nuclei | Bug BountyRecon |
OWASP ZAP zaproxy.org #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-11 2026 | OWASP Top 10 for LLMs 2025: Key Risks and Mitigation Strategies OWASP Top 10 for LLMs 2025: Key Risks and Mitigation Strategies | AI |
| 2026-04-10 2026 | OWASP WSTG: Testing JSON Web Tokens OWASP WSTG: Testing JSON Web Tokens | JWT |
| 2026-04-10 2026 | BLA9:2025 Broken Access Control - OWASP BLA9:2025 Broken Access Control - OWASP | AuthZ |
| 2026-04-10 2026 | OWASP A01: Broken Access Control Risks and Prevention OWASP A01: Broken Access Control Risks and Prevention | AuthZ |
| 2026-04-10 2026 | OWASP-TOP-10 A01:2025 Broken Access Control OWASP-TOP-10 A01:2025 Broken Access Control | AuthZ |
| 2026-04-10 2026 | IDOR - OWASP Foundation IDOR - OWASP Foundation | IDOR |
| 2026-04-03 2026 | Insecure Deserialization | OWASP Insecure Deserialization | OWASP | Deser |
| 2026-01-09 2026 | OWASP CRS Vulnerability Enables Charset Validation Bypass The content discusses a vulnerability in the OWASP CRS (Core Rule Set) that allows attackers to bypass charset validation. This vulnerability could potentially be exploited by malicious actors to evade security measures and launch attacks. It highlights the importance of addressing and patching vulnerabilities promptly to enhance cybersecurity defenses and protect systems from potential threats. | XSS |
| 2026-01-09 2026 | OWASP CRS Vulnerability Allows Attackers to Bypass Charset Validation The OWASP CRS vulnerability enables attackers to bypass charset validation, as reported on cyberpress.org. This vulnerability poses a security risk by allowing malicious actors to circumvent charset validation measures. Organizations using OWASP CRS should be aware of this issue and take necessary steps to mitigate the vulnerability to prevent potential attacks. | XSS |
| 2025-08-14 2025 | OWASP Videos The content is concise and simply states "OWASP Videos," indicating that there are videos related to the Open Web Application Security Project (OWASP). OWASP is a non-profit organization focused on improving software security. The videos likely cover various topics related to web application security, such as best practices, vulnerabilities, and tools. Viewers can expect educational content on how to secure web applications and prevent security breaches. | Talks |
| 2025-08-14 2025 | XSS (Cross Site Scripting) Prevention Cheat Sheet - OWASP The content is a XSS (Cross Site Scripting) Prevention Cheat Sheet provided by the Open Web Application Security Project (OWASP). It likely contains guidelines, best practices, and techniques to prevent XSS attacks on web applications. OWASP is a well-known organization that focuses on improving the security of software. The cheat sheet is a concise resource that developers can refer to for preventing XSS vulnerabilities in their web applications. | XSS |
| 2024-09-23 2024 | Sec_Mind_Maps/OWASP API TOP 10.pdf at main · h0tak88r/Sec_Mind_Maps cyber security mind maps collection. Contribute to h0tak88r/Sec_Mind_Maps development by creating an account on GitHub. | API Sec |
| 2024-07-22 2024 | DOM Based XSS | OWASP Foundation DOM Based XSS on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software. | XSS |
| 2022-02-27 2022 | Favorite tweet by @ZAProxyCon Favorite tweet:
You're invited to #ZAPCon 2022! ⚡️ Whether you are just getting started, or have a decade of experience with ZAP, ZAPCon will level-up your AppSec skills. 100% Virtual. 100% Free! 🎟️ ... | Bug BountyTalks |
| 2022-01-19 2022 | ZAPCon ZAPCon | Bug BountyTalks |
| 2020-01-31 2020 | OWASP Videos The OWASP Foundation hosts videos on its website to educate about software security. OWASP is a nonprofit organization dedicated to enhancing software security. | Talks |
TruffleHog github.com/trufflesecurity #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-19 2026 | Shai-Hulud: A Persistent Secret Leaking Campaign — GitGuardian Shai-Hulud: A Persistent Secret Leaking Campaign — GitGuardian | Supply Chain |
| 2026-04-17 2026 | TruffleHog: Deep Dive on Secret Management (Jit) TruffleHog: Deep Dive on Secret Management (Jit) | Secrets |
| 2026-04-17 2026 | TruffleHog Open Source v3 vs GitGuardian TruffleHog Open Source v3 vs GitGuardian | Secrets |
| 2026-04-17 2026 | git-secret-scanner: Find secrets with TruffleHog & Gitleaks git-secret-scanner: Find secrets with TruffleHog & Gitleaks | Secrets |
| 2026-04-17 2026 | Gitleaks vs TruffleHog 2026 Benchmarks (AppSec Santa) Gitleaks vs TruffleHog 2026 Benchmarks (AppSec Santa) | Secrets |
| 2026-04-17 2026 | Rafter: detect-secrets vs gitleaks vs TruffleHog Rafter: detect-secrets vs gitleaks vs TruffleHog | Secrets |
| 2026-04-11 2026 | How TruffleHog Verifies Secrets How TruffleHog Verifies Secrets | Secrets |
| 2026-04-10 2026 | Secret Scanner Comparison: Finding Your Best Tool Secret Scanner Comparison: Finding Your Best Tool | Secrets |
| 2026-04-10 2026 | 6 Effective Secret Scanning Tools 6 Effective Secret Scanning Tools | Secrets |
| 2026-04-10 2026 | 8 Best Secret Scanning Tools (2026) 8 Best Secret Scanning Tools (2026) | Secrets |
| 2026-04-10 2026 | Best Secret Scanning Tools in 2025 Best Secret Scanning Tools in 2025 | Secrets |
| 2026-04-03 2026 | TruffleHog - Find, Verify, and Analyze Leaked Credentials TruffleHog - Find, Verify, and Analyze Leaked Credentials | Secrets |
| 2022-03-17 2022 | Favorite tweet by @0x1shu Favorite tweet:
🧙♂️Git Secrets Leaks Simplified by @sec_r0 ✨ In this flyer, you'll learn about how git works and the reason behind the git secrets leaks. Download the flyer: https://t.co/zMruBpl6c4 ... | Bug Bounty |
| 2021-09-20 2021 | TruffleHog The Chrome Extension TruffleHog The Chrome Extension | Secrets |
amass github.com/owasp-amass #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-17 2026 | Complete Guide to Amass Tool (2025 Edition) Complete Guide to Amass Tool (2025 Edition) | Recon |
| 2026-04-10 2026 | Amass Cheat Sheet: 70+ Commands for Recon & Bug Bounty Amass Cheat Sheet: 70+ Commands for Recon & Bug Bounty | Recon |
| 2026-04-06 2026 | Using OWASP Amass with Netlas Module Using OWASP Amass with Netlas Module | Recon |
| 2026-04-03 2026 | How to Use Amass for Subdomain Enumeration and Recon Like a Pro How to Use Amass for Subdomain Enumeration and Recon Like a Pro | Recon |
| 2025-08-14 2025 | amass — Automated Attack Surface Mapping | Daniel Miessler The content appears to be a brief mention of "amass" by Daniel Miessler, a tool for Automated Attack Surface Mapping. It seems to be a tool or project related to cybersecurity and mapping out potential vulnerabilities in a system or network. The summary lacks specific details or insights about the tool's features or functionality. | Bug Bounty |
| 2021-10-28 2021 | Haklukes Guide to AmassHow to Use Amass More Effectively for Bug Bounties Haklukes Guide to AmassHow to Use Amass More Effectively for Bug Bounties | Bug BountyRecon |
| 2021-10-28 2021 | OWASP Amass - An Extensive Tutorial OWASP Amass - An Extensive Tutorial | Recon |
| 2021-10-28 2021 | Amass/config.ini at master OWASP/Amass Amass/config.ini at master OWASP/Amass | Recon |
| 2021-10-28 2021 | OWASP Amass - Users' Guide OWASP Amass - Users' Guide | Recon |
| 2021-10-28 2021 | OWASP/Amass OWASP/Amass | Recon |
| 2021-10-28 2021 | How to Use OWASP Amass: An Extensive Tutorial How to Use OWASP Amass: An Extensive Tutorial | Recon |
| 2019-11-12 2019 | amass — Automated Attack Surface Mapping | Daniel Miessler The content discusses amass, an automated attack surface mapping tool, providing a tutorial on its functionality and real-world examples for common OSINT (Open Source Intelligence) scenarios. The tutorial likely covers how to use amass to gather information about potential attack surfaces and demonstrates its practical application in cybersecurity investigations. | Bug Bounty |
Frida frida.re #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | Reverse engineering and modifying Android apps with JADX and Frida Reverse engineering and modifying Android apps with JADX and Frida | Mobile |
| 2026-04-22 2026 | Bypassing iOS Frida Detection with LLDB and Frida Bypassing iOS Frida Detection with LLDB and Frida | Mobile |
| 2026-04-22 2026 | frida-interception-and-unpinning: Scripts to MitM all HTTPS traffic frida-interception-and-unpinning: Scripts to MitM all HTTPS traffic | Mobile |
| 2026-04-16 2026 | Frida's Impact on Mobile Security and How to Fight Back Frida's Impact on Mobile Security and How to Fight Back | Mobile |
| 2026-04-16 2026 | From an Android Hook to RCE: $5000 Bounty From an Android Hook to RCE: $5000 Bounty | Mobile |
| 2026-04-11 2026 | Frida CodeShare: iOS Jailbreak Detection Bypass Frida CodeShare: iOS Jailbreak Detection Bypass | Mobile |
| 2026-04-11 2026 | iOS Jailbreak Detection Bypass with Frida - Full Guide iOS Jailbreak Detection Bypass with Frida - Full Guide | Mobile |
| 2026-04-10 2026 | Frida - OWASP Mobile Application Security Tool Frida - OWASP Mobile Application Security Tool | Mobile |
| 2026-04-03 2026 | Bypassing Certificate Pinning Using Frida: A Step-by-Step Guide Bypassing Certificate Pinning Using Frida: A Step-by-Step Guide | Mobile |
| 2026-04-03 2026 | Hail Frida!! The Universal SSL Pinning Bypass for Android Hail Frida!! The Universal SSL Pinning Bypass for Android | Mobile |
| 2026-04-03 2026 | Four Ways to Bypass Android SSL Verification and Certificate Pinning | NetSPI Four Ways to Bypass Android SSL Verification and Certificate Pinning | NetSPI | Mobile |
| 2026-04-03 2026 | Defeating Android Certificate Pinning with Frida Defeating Android Certificate Pinning with Frida | Mobile |
nmap nmap.org #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-17 2026 | Mastering Network Scanning: Nmap and Masscan Guide Mastering Network Scanning: Nmap and Masscan Guide | Recon |
| 2026-04-14 2026 | Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities https://ift.tt/Ib2LxWz | RCE |
| 2026-02-16 2026 | How I Built a 5-Path AI “Recon Beast” with n8n and Gemini (2026 Guide) In 2026, the bug bounty landscape requires more than just speed, with AI enhancing attacker capabilities. The article discusses building a 5-Path AI "Recon Beast" using n8n and Gemini. This innovative approach leverages automation and AI to enhance reconnaissance processes for bug bounty hunting. The focus is on utilizing technology to improve efficiency and effectiveness in identifying vulnerabilities. | AI |
| 2025-04-11 2025 | Nmap for Beginners: Easy Tips to Scan Networks Like a Pro So, Think this :::: one night when you are trying to sleep , suddenly you imagine what’s happening on your network .. what devices are connected? What services are they running? {JUST 2 AM THOUGHTS… | Recon |
| 2025-03-22 2025 | A Deep Dive into Nmap Scripts for Web Application Testing | by Khaleel Khan | System Weakness A Step-by-Step Guide to Leveraging Nmap’s Most Advanced Scripts for Comprehensive Web Application Security Analysis This scenario showcases how an experienced penetration tester could leverage Nmap’s… | Recon |
| 2025-01-29 2025 | GitHub - Chleba/netscanner: Terminal Network scanner & diagnostic tool with modern TUI Terminal Network scanner & diagnostic tool with modern TUI - Chleba/netscanner | Recon |
| 2025-01-28 2025 | GitHub - aceberg/WatchYourLAN: Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history - aceberg/WatchYourLAN | Recon |
| 2023-06-02 2023 | The Ultimate Guide to Port Scanning using Nmap | Nmap Notes https://ift.tt/5cnRhOF | Recon |
| 2023-04-20 2023 | Wazuh and NMAP integrarion for Network Vulnerability Scans Wazuh and NMAP integrarion for Network Vulnerability Scans https://ift.tt/YLbjMJ9 | Recon |
| 2021-12-31 2021 | https://awesomeopensource.com/projects/go/nmap https://awesomeopensource.com/projects/go/nmap | Recon |
| 2021-12-31 2021 | A modern and easy-to-use network scanner with golang A modern and easy-to-use network scanner with golang | Recon |
| 2021-09-13 2021 | Haklukes Guide to NmapPort Scanning is Just The Beginning Haklukes Guide to NmapPort Scanning is Just The Beginning | Recon |
gitleaks github.com/gitleaks #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | GitHub Secret Scanning 2026: New Patterns, Push Protection GitHub Secret Scanning 2026: New Patterns, Push Protection | Secrets |
| 2026-04-19 2026 | Pre-Commit Hooks for Secret Detection: Setup in 10 Minutes Pre-Commit Hooks for Secret Detection: Setup in 10 Minutes | Secrets |
| 2026-04-19 2026 | Understanding Your Organization's Exposure to Secret Leaks — GitHub Understanding Your Organization's Exposure to Secret Leaks — GitHub | Secrets |
| 2026-04-19 2026 | Exposed Developer Secrets Surge: AI Drives 34% Increase in 2025 Exposed Developer Secrets Surge: AI Drives 34% Increase in 2025 | Secrets |
| 2026-04-19 2026 | GitHub Found 39M Secret Leaks in 2024 — The GitHub Blog GitHub Found 39M Secret Leaks in 2024 — The GitHub Blog | Secrets |
| 2026-04-11 2026 | Secret Scanning in CI Pipelines using Gitleaks Secret Scanning in CI Pipelines using Gitleaks | Secrets |
| 2026-04-11 2026 | Add a Local Gitleaks Pre-Commit Hook Add a Local Gitleaks Pre-Commit Hook | Secrets |
| 2026-04-10 2026 | Top 8 Git Secrets Scanners in 2026 Top 8 Git Secrets Scanners in 2026 | Secrets |
| 2026-04-03 2026 | TruffleHog vs. Gitleaks: A Detailed Comparison TruffleHog vs. Gitleaks: A Detailed Comparison | Secrets |
| 2026-04-03 2026 | Gitleaks - Find Secrets with Gitleaks Gitleaks - Find Secrets with Gitleaks | Secrets |
ffuf github.com/ffuf #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters | Recon |
| 2026-04-11 2026 | Fuzzing Web Apps using FFUF: Complete Guide Fuzzing Web Apps using FFUF: Complete Guide | Fuzzing |
| 2026-04-11 2026 | FFUF Mastery: Advanced Web Fuzzing FFUF Mastery: Advanced Web Fuzzing | Fuzzing |
| 2025-08-14 2025 | A ffuf Primer | Daniel Miessler The content seems to be a primer on the tool "ffuf" by Daniel Miessler. It likely introduces readers to the basics of using ffuf, a versatile web fuzzer commonly used for web application security testing. The primer may cover how to install and utilize ffuf effectively for tasks such as discovering hidden files or directories, identifying vulnerabilities, and conducting comprehensive web scans. Daniel Miessler, a well-known cybersecurity expert, is likely the author of this primer, providing valuable insights and guidance on leveraging ffuf for security testing purposes. | Bug Bounty |
| 2023-09-03 2023 | ffuf advanced tricks - ACCEIS ffuf advanced tricks Note: This article is also available in french 🇫🇷. What the ffuf? ffuf is the acronym of Fuzz Faster U Fool, it is a command line utility (CLI) intended for penetration testers (p... | API SecFuzzing |
| 2022-01-16 2022 | How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes | Recon |
| 2022-01-10 2022 | ffuf - Fuzz Faster U Fool ffuf - Fuzz Faster U Fool | FuzzingRecon |
| 2021-02-16 2021 | A ffuf Primer | Daniel Miessler ffuf is a web attack tool written in Go, known as "fuzz faster you fool!". It operates through the command line interface (CLI) and is likened to Burp Intruder by experienced web testers. | Bug Bounty |
Shodan shodan.io #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | Shodan and Censys for beginners: How to find more vulnerabilities Shodan and Censys for beginners: How to find more vulnerabilities | Recon |
| 2026-04-17 2026 | Beyond Google: Navigating the Hidden Internet with Shodan and Censys Beyond Google: Navigating the Hidden Internet with Shodan and Censys | OSINT |
| 2026-04-17 2026 | sarenka: OSINT tool (Shodan/Censys) (GitHub) sarenka: OSINT tool (Shodan/Censys) (GitHub) | OSINT |
| 2025-09-21 2025 | Flask 3.1.1 SSRF Zero-Day Shodan dork exposed 500 targets 0day PoC (CWE-918) Full Article: nullsecurityx.codes/ssrf-vulnerabi Video: youtube.com/watch?v=Levx_p Responsible disclosure & defensive demo only. #infosec #vulnerability #SSRF #BugBounty A zero-day vulnerability in Flask 3.1.1 related to SSRF was exposed through a Shodan dork, revealing 500+ potential targets. A proof of concept (PoC) for this vulnerability (CWE-918) was shared. The full article and a video demonstrating the issue were provided. The disclosure was done responsibly, and a defensive demo was included. The content emphasizes information security, vulnerability, SSRF, and Bug Bounty programs. The details can be found at nullsecurityx.codes/ssrf-vulnerabi and the video is available on YouTube. | SSRF |
| 2025-09-21 2025 | New video: Flask 3.1.1 SSRF Zero-Day Shodan dork exposed 500 targets 0day PoC (CWE-918). Watch now youtube.com/watch?v=Levx_p Responsible disclosure & defensive demo only. #infosec #vulnerability #SSRF #BugBounty A new video exposes a Flask 3.1.1 SSRF Zero-Day vulnerability using a Shodan dork that revealed 500+ targets with a 0day Proof of Concept (CWE-918). The content emphasizes responsible disclosure and includes a defensive demo. The video can be watched on YouTube. The focus is on information security, vulnerability, SSRF, and Bug Bounty programs. | SSRF |
| 2025-09-21 2025 | PREMIERE TONIGHT: Flask 3.1.1 SSRF Zero-Day (CWE-918) 8:00 PM (03) In this video: Discover 500 potential targets via Shodan dork PoC demo Turn on notifications so you dont miss it! Watch here: youtube.com/watch?v=Levx_p #BugBounty #CyberSecurity #SSRF A video premiering tonight at 8:00 PM showcases a Flask 3.1.1 SSRF Zero-Day vulnerability (CWE-918). The content includes a demonstration of discovering 500 potential targets using Shodan dork. Viewers are encouraged to turn on notifications to not miss the premiere. The video link is provided for watching. The focus is on Bug Bounty, Cybersecurity, and SSRF. | SSRF |
| 2025-04-04 2025 | 10 Rare and Worthy Websites and Services for Security Professionals While platforms like Shodan, OWASP, and VirusTotal are staples for security professionals, there are many lesser-known websites and services that offer equally valuable tools and resources. These… | OSINT |
| 2024-12-14 2024 | 🚀 Introducing ShodanSpider v2: Your Ultimate Free Tool for CVE Searching and Shodan Data Analysis… In today’s fast-paced cybersecurity world, staying ahead of vulnerabilities is critical. ShodanSpider v2 takes your security research to… | Recon |
Snyk snyk.io #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-17 2026 | What is a Software Bill of Materials (SBOM)? (Snyk) What is a Software Bill of Materials (SBOM)? (Snyk) | Supply Chain |
| 2026-04-03 2026 | Why 28 Million Credentials Leaked on GitHub in 2025 | Snyk Why 28 Million Credentials Leaked on GitHub in 2025 | Snyk | Secrets |
| 2025-08-14 2025 | Go Security cheatsheet | Snyk Blog The content is a Go Security cheatsheet available on the Snyk Blog. It likely contains valuable information and tips related to securing Go applications. Readers can refer to this cheatsheet for quick guidance on enhancing the security of their Go projects. | |
| 2025-08-14 2025 | What is SSRF (server-side request forgery)? | Tutorial & examples | Snyk Learn The content discusses SSRF (server-side request forgery), explaining what it is and providing tutorials and examples. SSRF involves manipulating a server into making unintended requests on behalf of the attacker. The tutorial likely covers how to identify and prevent SSRF vulnerabilities to protect servers from unauthorized access or data leaks. It aims to educate readers on the risks associated with SSRF attacks and how to mitigate them effectively. | SSRF |
| 2025-07-23 2025 | New #CVE Record: CVE-2025-8020 All #Snyk versions of the package private-ip are #vulnerable to Server-Side Request Forgery (#SSRF) where an attacker can provide an IP or #hostname that resolves to a #multicast IP address (224.0.0.0/4) which is not included as part of the private The content discusses a new CVE record, CVE-2025-8020, indicating that all Snyk versions of the package private-ip are vulnerable to Server-Side Request Forgery (SSRF). This vulnerability allows an attacker to input an IP or hostname that resolves to a multicast IP address (224.0.0.0/4), not included in the private IP range. This poses a security risk. | SSRF |
| 2024-07-22 2024 | DOM Based XSS | Tutorial & Examples | Snyk Learn | Snyk Learn Learn how DOM based XSS exploits work, and how to mitigate and remediate the vulnerability with step-by-step interactive tutorials from security experts. | XSS |
| 2022-02-21 2022 | Go Security cheatsheet | Snyk Blog The cheatsheet on Go security best practices, created by Eric Smalling and Gerred Dillon, covers common topics to help users enhance security measures in Go programming. |
Trivy trivy.dev #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-18 2026 | Trivy Supply-Chain Attack: Trusted Scanner Compromised Rotate CI/CD Secrets Now Trivy Supply-Chain Attack: Trusted Scanner Compromised, Rotate CI/CD Secrets Now https://ift.tt/thjxOop | Supply Chain |
| 2026-04-15 2026 | GitHub Actions Supply Chain Attack: Trivy Breach & Workflow GitHub Actions Supply Chain Attack: Trivy Breach & Workflow https://ift.tt/hyjDUWY | Supply Chain |
| 2026-04-06 2026 | CERT-EU Confirms Trivy Supply Chain Attack Led to Credential Exposure CERT-EU Confirms Trivy Supply Chain Attack Led to Credential Exposure | Secrets |
| 2026-04-04 2026 | European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack https://ift.tt/rtNZKwj | Supply Chain |
| 2026-04-03 2026 | Open Source Security Tool Trivy Hit by Supply Chain Attack Prompting Urgent Industry Response Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response https://ift.tt/5MBpKYJ | Supply Chain |
| 2026-04-02 2026 | Trivy supply chain intrusion reportedly compromises Cisco source code Trivy supply chain intrusion reportedly compromises Cisco source code https://ift.tt/8Y4D9l2 | Supply Chain |
Caido caido.io #
| Date | Resource | Topics |
|---|---|---|
| 2025-12-10 2025 | Web App Hacking: Finding Web App Vulnerabilities with Caido Scanner Caido just became a serious Burp killer.
Scanner plugin auto-detects vulns as you browse + launches targeted attacks on suspicious endpoints:
https://t.co/wkiXeRK5CU | Burp |
| 2025-12-03 2025 | Web App Hacking: Finding Web App Vulnerabilities with Caido Scanner Caido just became a serious Burp killer.
Scanner plugin auto-detects vulns as you browse + launches targeted attacks on suspicious endpoints:
https://t.co/GqmmOXsL75
@three_cube | Burp |
| 2023-10-04 2023 | A lightweight web security auditing toolkit A lightweight web security auditing toolkit https://caido.io/ | Burp |
| 2023-07-19 2023 | Web App Hacking with Caido.io Web App Hacking with Caido.io https://www.youtube.com/watch?v=lW-u_2EByT4 | API SecBurp |
mitmproxy mitmproxy.org #
| Date | Resource | Topics |
|---|---|---|
| 2026-01-17 2026 | pwviptbl/ProxyHunter: Aplicação Python com interface gráfica que permite configurar regras de interceptação para modificar parâmetros de requisições HTTP. Quando o navegador envia uma requisição para uma rota configurada, o proxy intercepta, modifica apenas os parâmetros especificados e encaminha a requisição mantendo todos os outros parâmetros originais. Aplicação Python com interface gráfica que permite configurar regras de interceptação para modificar parâmetros de requisições HTTP. Quando o navegador envia uma requisição para uma rota configurad... | Python |
| 2025-11-24 2025 | A Terminal client for HTTP/GraphQL/gRPC with support for SSH tunnels, WebSockets, SSE, workflows, profiling, OpenAPI and response diffs. #golang
https://t.co/sDSO3DWkkl | GraphQL |
| 2024-11-29 2024 | Python Twisted proxy - how to intercept packets I'm trying to print out the body of a HTTP response using Python.
Here is my code sofar:
from twisted.web import proxy, http
from twisted.internet import reactor
from twisted.python import log
im... | Python |
| 2021-01-22 2021 | projectdiscovery/proxify: Swiss Army knife Proxy tool for HTTP/HTTPS traffi "projectdiscovery/proxify" is a versatile proxy tool designed for capturing, manipulating, and replaying HTTP/HTTPS traffic. It serves as a Swiss Army knife for handling various tasks related to network traffic on the go. The tool is available on GitHub under the projectdiscovery organization. |
MobSF github.com/MobSF #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | Reversing Android Apps: Bypassing Detection Like a Pro Reversing Android Apps: Bypassing Detection Like a Pro | Mobile |
| 2026-04-11 2026 | Mobile Security Framework - MobSF Documentation Mobile Security Framework - MobSF Documentation | Mobile |
| 2026-04-11 2026 | MobSF: Mobile Security Framework (GitHub) MobSF: Mobile Security Framework (GitHub) | Mobile |
| 2026-04-03 2026 | OWASP Mobile Top 10 and MobSF OWASP Mobile Top 10 and MobSF | Mobile |
Postman postman.com #
| Date | Resource | Topics |
|---|---|---|
| 2025-02-10 2025 | GitHub - usebruno/bruno: Opensource IDE For Exploring and Testing Api's (lightweight alternative to postman/insomnia) Opensource IDE For Exploring and Testing Api's (lightweight alternative to postman/insomnia) - usebruno/bruno | API Sec |
| 2024-12-13 2024 | Server SSL certificate verification - HTTPie 3.2.4 (latest) docs To skip the host’s SSL certificate verification, you can pass --verify=no (default is yes). | API Sec |
| 2022-06-09 2022 | Favorite tweet by @fardeenahmed411 Favorite tweet:
API Bug-Bounty Tools Check list (Part - 1) - Postman (It is like Burpsuite for API) - APISec - AppKnox - Synopsis API Scanner - Data Theorem API Secure #cybersecuritytips #bugbountyti... | API SecBug Bounty |
| 2021-08-25 2021 | API Testing with HTTPie API Testing with HTTPie | API Sec |
BeEF beefproject.com #
| Date | Resource | Topics |
|---|---|---|
| 2023-04-02 2023 | How to Hack Web Browsers with BeEF Framework How to Hack Web Browsers with BeEF Framework https://ift.tt/r8zkdW9 | XSS |
| 2022-05-11 2022 | Favorite tweet by @Nickieyey Favorite tweet:
Top XSS (Cross Site Scripting) Tools : 1) BeeF 2) BlueLotus_XSSReceiver 3) xssor2 4) Xsser-Varbaek 5) Xsser-Epsylon 6) Xenotix #pentesting #ethicalhacking #cybersecurity #CyberSec #we... | Bug BountyXSS |
| 2021-12-06 2021 | How to run BeEF behind an nginx reverse proxy with SSL correctly How to run BeEF behind an nginx reverse proxy with SSL correctly | Recon |
dirsearch github.com/maurosoria #
| Date | Resource | Topics |
|---|---|---|
| 2025-08-14 2025 | My First Case of SSRF Using Dirsearch | by Mba-oji Chiagoziem | Medium The content appears to be a personal account titled "My First Case of SSRF Using Dirsearch" by Mba-oji Chiagoziem on Medium. The author likely shares their experience encountering a Server-Side Request Forgery (SSRF) vulnerability while using the tool Dirsearch. The article may delve into the details of how the SSRF vulnerability was discovered, the implications of such a vulnerability, and potentially offer insights or lessons learned from the experience. | SSRF |
| 2023-10-04 2023 | Directory Listing Directory Listing https://ift.tt/hdv6BCV | Recon |
| 2023-09-03 2023 | GitHub - dirkjanm/adidnsdump: Active Directory Integrated DNS dumping by any authenticated user Active Directory Integrated DNS dumping by any authenticated user - GitHub - dirkjanm/adidnsdump: Active Directory Integrated DNS dumping by any authenticated user | AuthN |
semgrep semgrep.dev #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-16 2026 | tj-actions/changed-files Compromised - Semgrep tj-actions/changed-files Compromised - Semgrep | Supply Chain |
| 2026-04-03 2026 | Insecure Deserialization in Python | Semgrep Insecure Deserialization in Python | Semgrep | Python |
| 2021-12-13 2021 | Semgrep Semgrep | RCESupply Chain |
subfinder github.com/projectdiscovery #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-19 2026 | SubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025 SubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025 | Recon |
| 2026-04-03 2026 | Subfinder Complete Guide 2025: Subdomain Enumeration Mastery Subfinder Complete Guide 2025: Subdomain Enumeration Mastery | Recon |
| 2019-08-20 2019 | Automated monitoring of subdomains for fun and profit — Release of Sublert "Sublert" is a tool released for automated monitoring of subdomains for bug bounty programs. The bug bounty industry is rapidly growing, leading to fierce competition among programs. Sublert aims to assist in identifying security vulnerabilities in subdomains, potentially leading to financial rewards for bug hunters. | Bug Bounty |
Wireshark wireshark.org #
| Date | Resource | Topics |
|---|---|---|
| 2023-11-05 2023 | TrafficWatch - TrafficWatch A Packet Sniffer Tool Allows You To Monitor And Analyze Network Traffic From PCAP Files TrafficWatch - TrafficWatch, A Packet Sniffer Tool, Allows You To Monitor And Analyze Network Traffic From PCAP Files https://ift.tt/c1tg2uv | Recon |
| 2023-01-31 2023 | Creating an Advanced Network Packet Sniffer in Python: A Step-by-Step Guide The content is a step-by-step guide on creating an advanced network packet sniffer using Python. It provides detailed instructions on how to build the sniffer tool, which can capture and analyze network packets for various purposes. The guide likely covers topics such as setting up the necessary libraries, capturing packets, analyzing packet data, and potentially implementing additional features for advanced functionality. Overall, the content aims to help readers understand the process of creating a network packet sniffer using Python through a structured and informative guide. | Python |
| 2022-01-15 2022 | Capturing Network Traffic With Python And TShark Capturing Network Traffic With Python And TShark | Python |