Browse by tool
Resources tagged to a specific AppSec tool — Burp Suite, sqlmap, nuclei, Frida, and others. Tools with fewer than 3 resources are not listed. The same resource can appear under multiple topics; topic tags in each row link back to the topic page.
Burp Suite 244
sqlmap 48
nuclei 18
OWASP ZAP 15
TruffleHog 15
amass 12
Frida 12
nmap 11
gitleaks 10
ffuf 8
Shodan 8
Snyk 7
Trivy 6
Wireshark 6
MobSF 5
Caido 4
mitmproxy 4
Postman 4
BeEF 3
dirsearch 3
semgrep 3
subfinder 3
Burp Suite portswigger.net #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | PortSwigger Lab: Exploiting a Mass Assignment Vulnerability Lab walkthrough demonstrating exploitation of a mass assignment vulnerability to purchase a product. The lab involves logging in with `wiener:peter`, adding an item to the basket, and then identifying and manipulating a `chosen_discount` parameter within the `/api/checkout` POST request. By adding this hidden parameter and altering its value, users can bypass credit limitations and solve the exercise. | API Sec |
| 2026-04-22 2026 | GraphQL - PortSwigger Lab Writeup Writeup detailing GraphQL vulnerabilities and exploitation techniques. It covers bypassing introspection query regex validation, brute-forcing logins using aliases to circumvent rate limiting, and performing CSRF by converting requests to `x-www-form-urlencoded`. The entry also demonstrates how to find hidden GraphQL endpoints using directory fuzzing with Gobuster. | Bug Bounty |
| 2026-04-22 2026 | SulphurAPI: Burp Suite extension for automating OWASP API Top 10 detection Extension for automating OWASP API Top 10 detection within Burp Suite. SulphurAPI includes checks for mass assignment, authentication, and authorization vulnerabilities, alongside OpenID Connect/OAuth2 management and advanced OpenAPI parsing for versions 2.0 to 3.1.1. | Burp |
| 2026-04-22 2026 | Awesome Burp Extensions 2025 Library of curated Burp extensions for enhancing web application penetration testing. Features include scanners for vulnerabilities like Log4Shell (CVE-2021-44228), HTTP Request Smuggling, and Java deserialization. Additional extensions aid in discovering Content Security Policy (CSP) bypasses, identifying software versions, detecting reverse proxies, and testing for Cloudflare origin IPs, among many other specialized checks and integrations. | Burp |
| 2026-04-22 2026 | The Future of Security Testing: AI-Powered Extensibility in Burp Library for AI-powered extensibility in Burp Suite Professional, leveraging the Montoya API to integrate AI capabilities for enhanced security testing and automation. This allows for seamless integration of AI, exemplified by Gareth Heyes' enhanced Hackvertor extension, which enables custom transformations without coding. Users receive free AI credits to experiment and build their own AI-powered extensions, with options to submit them to the BApp store. | Burp |
| 2026-04-22 2026 | Filtering the WebSockets history with scripts Library for filtering WebSockets history in Burp Suite, allowing users to create and load custom Java-based scripts. Users can write new scripts from templates, convert existing filter settings into scripts, or import scripts from their Bambda library. The library supports two key Montoya API objects, `ProxyWebSocketMessage` and `Utilities`, to facilitate script development for analyzing and filtering WebSocket traffic based on criteria like message direction and payload length. | Burp |
| 2026-04-22 2026 | Filtering the HTTP history with scripts (Bambdas) Library for creating custom Java-based scripts, known as Bambdas, to filter Burp Suite's HTTP history. Users can load pre-existing scripts from their library or create new ones using built-in templates or by converting existing filter settings. The library leverages the Montoya API and provides a GitHub repository for community contributions and examples, enabling advanced traffic analysis based on criteria like response status codes and cookie presence. | Burp |
| 2026-04-22 2026 | Developing AI features in Burp extensions Library for integrating AI capabilities into Burp Suite extensions via the Montoya API. This resource details how extensions must declare AI feature support using `EnhancedCapability.AI_FEATURES` and verify availability with `Ai.isEnabled()`. It explains sending single-shot and multi-turn prompts using `Message` objects for system, user, and assistant roles, and handling responses through `PromptResponse`. | Burp |
| 2026-04-22 2026 | Burp AI - PortSwigger Documentation Library integrating AI capabilities into Burp Suite for enhanced security testing. Features include AI in Repeater for custom prompts, Explore Issue for autonomous vulnerability investigation, and Explainer for understanding web technologies. It also offers AI-powered false positive reduction for Broken Access Control, automated recorded logins, and extensible AI features via the Montoya API, all while prioritizing user control, data privacy, and industry-standard security. | Burp |
| 2026-04-22 2026 | Bambdas - PortSwigger Documentation Library for scripting Burp Suite's interface to personalize tasks. Bambdas allow for custom match-and-replace rules, table columns, filters, and scan checks. Scripts can be saved, imported from sources like the Bambdas GitHub repository, and reused across projects. PortSwigger warns that Bambda scripts can execute arbitrary code, advising caution with unverified sources. | Burp |
| 2026-04-22 2026 | Hunting for IDOR and BAC in B2B Apps with Burp Authorize Hunting for IDOR and BAC in B2B Apps with Burp Authorize | IDOR |
| 2026-04-22 2026 | IDOR-Scanner: Burp Suite Extension for Automated IDOR Detection Extension for Burp Suite that automatically detects Insecure Direct Object Reference (IDOR) vulnerabilities. It passively scans HTTP requests and responses for numeric fields in URL paths, query parameters, JSON, and form data. Actively, it increments these numeric fields, sending modified requests to identify confirmed IDORs by checking for differing response sizes and 200 OK statuses. An option to right-click and scan specific issues is also provided. | IDOR |
| 2026-04-20 2026 | Meta and PortSwigger drive offensive security further to find what others miss Library. This partnership between Meta Bug Bounty and PortSwigger integrates Meta’s bug bounty program with Burp Suite Professional, aiming to enhance vulnerability discovery and researcher skills. Selected HackerPlus Silver league researchers receive Burp Suite Professional licenses to leverage its technical capabilities alongside Meta's collaborative program, fostering improved tooling and education for the security community. | Bug Bounty |
| 2026-04-19 2026 | Pentest-Mapper: Burp Extension for Pentesters & Bug Bounty Library for Burp Suite that maps application testing flows with custom checklists. Pentest-Mapper logs API calls, allowing users to connect them to specific vulnerabilities from a loaded checklist. It also tracks test cases, enables vulnerability mapping with severity, and offers auto-save, import/export functionality, and auto-logging of scoped APIs. | Burp |
| 2026-04-19 2026 | Burp Suite Extension: Copy For — Black Hills InfoSec Library for Burp Suite that generates command-line syntax for security tools like `curl`, `ffuf`, `jwt_tool.py`, `Nikto`, `Nmap`, `Nuclei`, and `wget` directly from requests. It supports variable substitution and configurable flags, allowing users to create custom commands. | Burp |
| 2026-04-19 2026 | Burp AI — PortSwigger Burp AI — PortSwigger | Burp |
| 2026-04-19 2026 | Pentest Mapper: Burp Extension for Application Pentesting Extension for Burp Suite that integrates request logging with a custom application testing checklist. It enables users to map application flows and API calls, link them to vulnerabilities from a customizable checklist, and track parameters and severity. Features include auto-saving, import/export functionality, and the ability to map individual requests to vulnerabilities with optional CVSS scoring. | Burp |
| 2026-04-19 2026 | Pentest Mapper — PortSwigger BApp Store Library for mapping application flows during penetration testing. Pentest Mapper integrates Burp Suite request logging with a custom checklist, allowing testers to connect API calls to specific functions and map identified vulnerabilities. This Burp Suite extension facilitates a structured approach to application analysis and vulnerability assessment. | Burp |
| 2026-04-17 2026 | Maximizing IDOR Detection with Burp Suite's Autorize Library for Burp Suite's Autorize extension, this resource details how to leverage it for identifying Insecure Direct Object Reference (IDOR) vulnerabilities by automatically testing authorization with low-privileged user session cookies. It explains the extension's functionality, including its enforcement status detection and customizable filters for identifying authorization bypasses, and provides installation and usage instructions with examples against OWASP Juice Shop. | IDOR |
| 2026-04-17 2026 | Manual and semi-automated testing for IDORs using Burp Suite Library for semi-automated and manual testing of Insecure Direct Object References (IDORs) using Burp Suite. It details how to leverage the Autorize plugin for automated checks by sending captured requests from different user contexts and offers a manual approach by identifying and manipulating object identifiers within Burp Suite's Repeater tool, referencing PortSwigger labs as an example. | IDOR |
| 2026-04-17 2026 | Testing for IDORs (PortSwigger Burp docs) Library for testing Insecure Direct Object References (IDORs), a common access control vulnerability where an application directly uses user-supplied input to access objects. This resource guides users through identifying potential IDORs in parameters, forwarding requests to Burp Intruder, configuring a Sniper attack with payload positions, and analyzing responses to confirm unauthorized access, using an example involving a user ID parameter. | IDOR |
| 2026-04-16 2026 | IDOR Hunting with Burp Suite: A $1,000 Bug Bounty Case Study Tool for hunting Insecure Direct Object Reference (IDOR) vulnerabilities, focusing on a $1,000 bug bounty case. It details how Burp Suite's Proxy, Repeater, and Intruder features can be used to identify and automate the discovery of IDORs by tampering with object identifiers and analyzing responses. The entry also covers common IDOR scenarios in APIs, including GraphQL and RESTful endpoints, and provides developer-side prevention techniques like server-side authorization checks and the use of indirect or signed references. | IDOR |
| 2026-04-16 2026 | InQL: Advanced GraphQL Security Testing Burp Extension Library for advanced GraphQL security testing, InQL integrates with Burp Suite. It offers a scanner for auto-generating queries and mutations, customizable scans with 'Points of Interest' analysis for vulnerability detection, and circular reference detection. InQL also supports batch queries, custom headers, engine fingerprinting even when introspection is disabled, and interactive schema visualization through GraphiQL and GraphQL Voyager. | GraphQL |
| 2026-04-16 2026 | Burp Suite Professional Testing Handbook Library for Burp Suite Professional, an HTTP interception proxy with features for web application security testing. It aids in identifying server-side and client-side vulnerabilities by intercepting and manipulating requests/responses, fuzzing payloads with Intruder, and analyzing traffic with Proxy and Scanner. The handbook also mentions Burp's DOM Invader extension and Trail of Bits webinars on mastering web research with Burp Suite. | Burp |
| 2026-04-16 2026 | Bambdas Collection for Burp Suite Professional and Community Library of Bambdas for Burp Suite, offering scripts for table filters, custom columns, Repeater actions, match and replace rules, and custom scan checks. Developed by PortSwigger and the community, these scripts enhance Burp Suite's functionality, with Java-based checks available in this repository and BChecks in a separate repo. Instructions cover importing, updating, and contributing scripts, with security warnings about executing arbitrary code. Resources include detailed documentation and video tutorials on various Bambda functionalities. | Burp |
| 2026-04-16 2026 | BurpSuite for Pentester - Vulnerability Hunting Cheatsheet Library for penetration testers and bug bounty hunters, this practical Burp Suite cheat sheet aids in efficiently discovering web application vulnerabilities from P4 to P1. It offers a structured reference for web application security testing, guiding users on leveraging Burp Suite's features for traffic interception, request analysis, parameter fuzzing, and identifying vulnerabilities in modern web applications. | Burp |
| 2026-04-16 2026 | Weaponize Your Burp - Bug Bounty Hunting Automation Library for automating Burp Suite for bug bounty hunting. This project weaponizes Burp Suite with extensions like Burp Bounty Pro, Logger++, and AutoRepeater. It details a methodology for integrating custom payloads into AutoRepeater and using Logger++ filters to identify potential vulnerabilities, then sending suspicious requests to Repeater for exploitation. Examples demonstrate configuring custom payloads to enhance bug hunting capabilities. | Burp |
| 2026-04-16 2026 | Smart Automation with Burp Suite - YesWeHack Library for automating Burp Suite workflows, this resource details using passive scanners like the built-in passive scanner and passive crawler, alongside extensions such as BChecks, Burp Bounty, and Logger++, to streamline bug bounty efforts. It explains how to combine active and passive scanning to efficiently gather information and discover vulnerabilities, emphasizing the importance of custom headers for tracking BCheck requests and leveraging error messages for deeper analysis, while still advocating for manual testing to complement automated findings. | Burp |
| 2026-04-16 2026 | A Guide to Build Burp Suite Extensions Using Montoya API and Java A Guide to Build Burp Suite Extensions Using Montoya API and Java | Burp |
| 2026-04-16 2026 | Power Up Pen Tests: Create Burp Suite Extensions with Montoya API Library for developing Burp Suite extensions using the Montoya API, streamlining tasks like authentication handling, API data mining, and UI visualization. This API, introduced in Burp Suite 2022.9.5, offers improved object-oriented design, WebSocket support, and simplified HTTP message manipulation compared to the older extender API, enabling developers to create more robust and flexible tools like the example "BurpCage" extension that replaces images with Nicolas Cage photos. | Burp |
| 2026-04-16 2026 | Burp Suite Extensions - Overview and Introduction with Kotlin Library for developing Burp Suite extensions, focusing on the modern MontoyaApi with Kotlin. This resource details how to create powerful extensions, introducing concepts like Bambdas for filtering and BChecks for custom scan checks. It showcases the development of the HeaderMate extension, which automates server response header evaluation against OWASP recommendations and configurable rules, offering features like selective host checking, issue creation toggling, and CSV export. | Burp |
| 2026-04-16 2026 | Creating Burp Extensions: A Beginner's Guide - Black Hills InfoSec Library for creating Burp Suite extensions. This resource guides beginners through developing custom functionalities for Burp Suite, a web application proxy essential for security testing. It explains what Burp extensions are, why they enhance testing capabilities, and covers the necessary tools and languages for development. The presentation introduces the Montoya API for integration and showcases a practical example of a JWT editor extension, illustrating how these additions expand Burp Suite's utility beyond its default features. | Burp |
| 2026-04-16 2026 | PortSwigger's Top 10 Web Hacking Techniques of 2025 Reference listing the top 10 web hacking techniques of 2025, curated by an expert panel from community nominations. Techniques include Parser Differentials, Playing with HTTP/2 CONNECT, XSS-Leak, Next.js cache poisoning, Cross-Site ETag Length Leak, SOAPwn (RCE via HttpWebClientProtocol flaw), Unicode normalization attacks like "Lost in Translation," blind SSRF visibility techniques, ORM leaks, and "Successful Errors" for blind server-side template injection. The analysis highlights trends in side-channel attacks and new exploitation primitives. | Bug Bounty |
| 2026-04-14 2026 | Found SSRF vulnerability allowed to access admin panel and delete user account. StockAPI Burp Intruder Admin URL Deleted user account (carlos) #SSRF #WebSecurityAcademy #Portswigger #Lab #Vulnerability pic.x.com/EiIMQEUyxQ Found SSRF vulnerability allowed to access admin panel and delete user account. StockAPI Burp Intruder Admin URL Deleted user account (carlos) #SSRF #WebSecurityAcademy #Portswigger #Lab #Vulnerab... | SSRF |
| 2026-04-10 2026 | OWASP Testing for Server Side Template Injection Reference for testing Server-Side Template Injection (SSTI) vulnerabilities in web applications, a common flaw found when user input is unsafely embedded in templating engines like Jinja2 and Twig, potentially leading to remote code execution. The guide details methods for detecting injection points, identifying templating engines, and building exploits, referencing tools such as Tplmap and Burp Suite extensions. It also covers testing in both plaintext and code contexts. | SSTI |
| 2026-04-10 2026 | Server-side template injection PortSwigger KB Library detailing Server-side template injection, a vulnerability where user input is unsafely embedded into server-side templates, potentially allowing arbitrary code execution and server control. It covers identifying template engine types, mapping the attack surface, and auditing exposed objects, noting severity varies by engine. Remediation strategies include avoiding user-generated templates, using logic-less engines like Mustache, or sandboxing rendering environments. This vulnerability is classified under CWE-94, CWE-95, and CWE-116, often carrying a high severity. | SSTI |
| 2026-04-10 2026 | Template Injection Research | PortSwigger Research Library covering template injection, detailing both Client Side Template Injection (CSTI) and Server Side Template Injection (SSTI). Learn techniques to bypass Content Security Policy (CSP) and exploit client-side vulnerabilities similar to Cross-Site Scripting (XSS), including breaking the AngularJS sandbox as presented at BSides Manchester. Explore server-side exploitation, detecting templating engines, and achieving Remote Code Execution (RCE), including research presented at Black Hat USA on SSTI. | SSTI |
| 2026-04-10 2026 | Server-Side Template Injection | PortSwigger Research Reference for Server-Side Template Injection (SSTI) details a methodology for detecting and exploiting template engines like Twig and FreeMarker, which are commonly used to embed dynamic content. SSTI vulnerabilities arise when user input is unsafely embedded in templates, potentially leading to Remote Code Execution (RCE). The research outlines detection techniques for both "text" and "variable" contexts, emphasizing the importance of identifying the specific template engine and its documentation to craft effective exploits, including escaping sandbox modes. | SSTI |
| 2026-04-10 2026 | Server-side template injection | Web Security Academy Library explaining server-side template injection, a vulnerability where attackers inject malicious payloads into templates to achieve remote code execution or access sensitive data. It details how these vulnerabilities arise when user input is directly concatenated into templates instead of being passed as data, and outlines detection methods like fuzzing with special characters and testing mathematical operations in plaintext or code contexts, applicable to engines like Twig and Freemarker. | SSTI |
| 2026-04-10 2026 | PortSwigger KB: JWT none algorithm supported Library for detecting JWT "none" algorithm vulnerabilities. This flaw allows an attacker to tamper with the JWT's `alg` header to "none", remove the signature, and submit an unsigned token. If the server accepts this, attackers can escalate privileges or impersonate users by modifying arbitrary claims in the payload. Remediation involves configuring JWT libraries to reject unsecured tokens and only accept cryptographically strong algorithms. | JWT |
| 2026-04-10 2026 | Working with JWTs in Burp Suite Library for testing JWT authentication bypass vulnerabilities in Burp Suite. It allows users to view and decode JWTs within Burp Inspector, and then utilize the JWT Editor extension to generate cryptographic signing keys, edit token headers and payloads, and resign the modified JWT with a valid signature. The extension automatically flags requests containing JWTs, streamlining the identification and manipulation process. | JWT |
| 2026-04-10 2026 | JSON Web Token Attacker Burp extension Extension that assists in pentesting applications utilizing JavaScript Object Signing and Encryption (JOSE), specifically targeting JSON Web Tokens. This tool automates the discovery and testing of vulnerabilities within JOSE implementations, aiding security professionals in identifying potential weaknesses during application assessments. | JWT |
| 2026-04-10 2026 | JWT Scanner Burp extension Extension for Burp Suite that scans for JWT vulnerabilities by highlighting tokens and initiating scans. It supports forging public keys when they are not exposed, allowing for further exploitation and vulnerability discovery by rerunning scans after successful forging. | JWT |
| 2026-04-10 2026 | PortSwigger jwt-editor: Burp Suite extension for editing and signing JWTs Library for manipulating JSON Web Tokens (JWTs) within Burp Suite, this tool detects and allows editing, signing, verifying, encrypting, and decrypting JWTs in HTTP and WebSocket messages. It offers detection of JWTs, highlighting, and an Intruder payload provider. Functionality includes importing/exporting cryptographic keys, editing JWS/JWE components with JSON and hex editors, and performing attacks such as "none" algorithm bypass, HMAC key confusion, embedded JWK, signing with an empty HMAC key, Psychic signatures (CVE-2022-21449), and collaborator integration. | JWT |
| 2026-04-10 2026 | Blind SSRF with Burp Collaborator Blind SSRF with Burp Collaborator | SSRF |
| 2026-04-10 2026 | Mastering Blind SSRF Detection With Burp Suite Analysis of Blind SSRF detection using Burp Suite, detailing techniques like header bruteforcing with Intruder, out-of-band detection via Collaborator, and real-time monitoring with the Taborator extension. It covers advanced payload strategies including numerical ranges and cloud metadata endpoint enumeration, alongside Python scripting for automation and integration with the Burp API, emphasizing the critical need for proactive SSRF testing against evolving cloud-focused exploits. | SSRF |
| 2026-04-10 2026 | Testing for Blind SSRF with Burp Suite Tutorial on detecting blind SSRF vulnerabilities using Burp Suite's Collaborator. This method involves injecting a Collaborator payload into an HTTP request, often within parameters like `productId` or headers like `Referer`, and then monitoring the Collaborator tab for out-of-band interactions from the target application. The presence of these interactions confirms the application's susceptibility to blind SSRF. | SSRF |
| 2026-04-10 2026 | Uncovering Blind SSRF Using Burp Collaborator Uncovering Blind SSRF Using Burp Collaborator | SSRF |
| 2026-04-10 2026 | Burp Suite Certified Practitioner Guide 2026 Guide to the Burp Suite Certified Practitioner (BSCP) exam, PortSwigger’s hands-on web application security certification. This resource details the exam format, including its remote, proctored, timed structure with two live applications, and the three sequential stages required per application. It emphasizes demonstrating exploit impact, using Burp Suite Professional and allowed third-party tools like ysoserial, and mastering techniques such as XSS exploitation, SQL injection, and SSRF. The guide offers preparation strategies, including PortSwigger’s official prep path, practice exams, and sample 30, 60, and 90-day study plans, to help candidates achieve certification. | Burp |
| 2026-04-10 2026 | Top 10 Burp Extensions Every Pentester Should Use Top 10 Burp Extensions Every Pentester Should Use | Burp |
| 2026-04-10 2026 | Burp AI in 2026: Real Workflow Changes Library integrating AI into Burp Suite Professional (v2025.2+) for enhanced web security testing. Features include Burp AI in Repeater for auditable HTTP message analysis, Explainer for quick understanding of unfamiliar artifacts, and Explore Issue for automated follow-up on Burp Scanner findings. Usage is consumption-based via AI credits assigned per user, requiring careful management of prompts for cost-effectiveness and accurate validation of vulnerabilities. | Burp |
| 2026-04-10 2026 | Burp Suite Professional 2026.1 Release Library update introducing the Discover tab for feature exploration, command palette for faster table navigation, improved time-based SQL injection detection filtering WAF delays, and SPNEGO support for NTLM authentication. This release also includes a Java update to 25.0.1 and a browser upgrade to Chromium 143. | Burp |
| 2026-04-10 2026 | Burp Suite Professional 2025.5 Release Library release notes for Burp Suite Professional 2025.5 detailing new AI-powered custom actions in Repeater for context-aware HTTP message analysis, including a sample action to explain text and a template for testing race condition vulnerabilities. The release also incorporates Montoya API updates for direct extension settings integration, and quality-of-life improvements such as access to timing data for custom actions and faster body encoding switching. | Burp |
| 2026-04-10 2026 | 10 Burp Suite Extensions That Will Instantly Boost Your Work 10 Burp Suite Extensions That Will Instantly Boost Your Work | Burp |
| 2026-04-10 2026 | How Burp Suite DAST Is Leveling Up Enterprise Security in 2025 Tool updates to Burp Suite DAST in 2025 enhance enterprise security testing by automating scan scheduling for portfolios, organizing assets with custom tags, and improving API scanning with automatic token refreshes. It accelerates vulnerability detection by crawling and auditing SPAs in parallel and integrates seamlessly with Jira for streamlined remediation tracking, supporting parent-child issue hierarchies and automated ticket creation. New onboarding packages aim to shorten learning curves and ensure fast results. | Burp |
| 2026-04-10 2026 | Burp Suite Professional 2025.2: Built-in AI Integration Burp Suite Professional 2025.2: Built-in AI Integration | Burp |
| 2026-04-10 2026 | PortSwigger Blind XXE Lab Write-up PortSwigger Blind XXE Lab Write-up | XXE |
| 2026-04-10 2026 | PortSwigger XXE Injection Writeups Writeups detailing nine PortSwigger labs demonstrate exploitation of XML External Entity (XXE) vulnerabilities. Techniques covered include retrieving files from `/etc/passwd` and `/etc/hostname`, performing Server-Side Request Forgery (SSRF) to access EC2 metadata and obtain IAM credentials, bypassing security restrictions using XInclude and parameter entities, out-of-band data exfiltration via Burp Collaborator, and repurposing local DTDs to extract data through error messages. The labs also showcase exploiting XXE via image file uploads using SVG. | XXE |
| 2026-04-10 2026 | Insecure Direct Object References (IDOR) | PortSwigger Reference on Insecure Direct Object References (IDOR), an OWASP Top Ten vulnerability type where applications misuse user-supplied input to access objects directly. It details how attackers can exploit this, leading to horizontal or vertical privilege escalation by altering parameters to access other users' data, such as in database queries (e.g., `customer_account?customer_number=132355`) or static files (e.g., `/static/12144.txt`). | AuthZIDOR |
| 2026-04-10 2026 | 100+ Burp Suite Online Courses for 2026 100+ Burp Suite Online Courses for 2026 | Burp |
| 2026-04-10 2026 | Burp Suite AI Extension for Pentester Burp Suite AI Extension for Pentester | Burp |
| 2026-04-10 2026 | Burp Suite Goes AI: Revolutionizing Web Pentesting Library integration of AI-powered extensions into Burp Suite Professional, developed by PortSwigger, automates web pentesting tasks. This update offers security professionals enhanced efficiency and deeper vulnerability insights, with features like custom tag generation in Hackvertor using natural language prompts. The integration aims to simplify AI model management and allows extensions to be shared via the BApp Store, including an initial offering of 10,000 free AI credits. | Burp |
| 2026-04-10 2026 | Burp Suite Integration for Neuron Library that streamlines the security testing workflow by integrating Burp Suite findings directly into the Neuron platform. The Neuron Burp Suite Extension allows testers to push identified issues from Burp, automatically creating structured findings within Neuron, complete with request/response evidence, linked to specific web applications and endpoints. This eliminates redundant work by enabling findings to be directly associated with defined web application assets, including hostnames, endpoints, parameters, and scope metadata, facilitating clearer reporting and a standardized system of record for web application security testing across teams. | Burp |
| 2026-04-10 2026 | The Future of Pentesting: Burp Suite + Cursor AI The Future of Pentesting: Burp Suite + Cursor AI | Burp |
| 2026-04-10 2026 | SQL Injection Tutorial & Examples - PortSwigger Tutorial on SQL injection covers its definition, methods for finding and exploiting vulnerabilities such as retrieving hidden data, subverting application logic with UNION attacks, and blind SQL injection. It details manual detection techniques like using single quotes, SQL syntax, boolean conditions, and time delays, and mentions Burp Scanner for automated detection. The resource also addresses injection in different parts of SQL queries, including WHERE, UPDATE, INSERT, SELECT, and ORDER BY clauses, and provides practical examples. | SQLi |
| 2026-04-10 2026 | GraphQL API Vulnerabilities - PortSwigger Library for testing GraphQL APIs, detailing common vulnerabilities like introspection enablement and insecure direct object references (IDORs). It covers techniques for discovering GraphQL endpoints, including universal queries and common endpoint names, and demonstrates how to exploit unsanitized arguments to access unauthorized data. The library also explains how to use introspection queries to gather schema information and identifies methods for probing and running full introspection queries against vulnerable endpoints. | GraphQL |
| 2026-04-06 2026 | Toolchain: Nmap, Burp Suite, and Metasploit - A Practical Workflow Guide Library for practical penetration testing workflows, integrating Nmap, Burp Suite, and Metasploit. Nmap maps the attack surface by identifying live hosts, open ports, service versions, and OS fingerprints. Burp Suite then tests web applications, intercepting and modifying HTTP requests to find vulnerabilities like SQL injection, XSS, and IDOR. Finally, Metasploit validates identified vulnerabilities, demonstrating exploitability and impact, leveraging modules for specific exploits and post-exploitation actions. | Burp |
| 2026-04-06 2026 | Top 10 Burp Suite Extensions Every Pentester Should Use Top 10 Burp Suite Extensions Every Pentester Should Use | Burp |
| 2026-04-03 2026 | Lab: SameSite Lax Bypass via Cookie Refresh | PortSwigger Lab demonstrating a CSRF attack to bypass SameSite cookie restrictions. This lab involves changing a victim's email address by exploiting a vulnerable account change function. The technique focuses on a SameSite Lax bypass via cookie refresh, requiring an attacker to circumvent browser popup blockers and induce user interaction to trigger the necessary OAuth flow and subsequent email modification. | CSRF |
| 2026-04-03 2026 | Lab: SameSite Lax Bypass via Method Override | PortSwigger Lab: SameSite Lax bypass via method override details a Cross-Site Request Forgery (CSRF) vulnerability within the "change email" function. The lab demonstrates how to bypass SameSite cookie restrictions, specifically the Lax default, by crafting a GET request that overrides the intended POST method using the `_method` parameter. The solution involves using an exploit server to trigger a top-level navigation that sends the malicious request, ultimately changing the victim's email address. | CSRF |
| 2026-04-03 2026 | Installing Extensions from BApp Store | PortSwigger Installing Extensions from BApp Store | PortSwigger | Burp |
| 2026-04-03 2026 | 3 Powerful Burp Suite Extensions Every Pentester Should Use 3 Powerful Burp Suite Extensions Every Pentester Should Use | Burp |
| 2026-04-03 2026 | BApp Store | PortSwigger Library of Burp Suite extensions featuring tools for identifying and bypassing common web application vulnerabilities. This collection includes extensions for automating 403 bypasses, detecting SQL injection and XSS through AI analysis, fuzzing LLM prompts, scanning for AWS and cloud storage misconfigurations, and finding DOM-based vulnerabilities. Specific extensions like "Anonymous Cloud, Configuration and Subdomain Takeover Scanner" and "AI HTTP Analyzer" are detailed, alongside capabilities for AES payload manipulation and CSP header analysis. | Burp |
| 2026-04-03 2026 | Burp Suite Professional BApps: Maximizing Pentester Productivity Library of Burp Suite Professional BApps that enhance pentester productivity by automating workflows, accelerating discovery, and reducing manual effort. These extensions integrate into Burp Suite Professional to customize capabilities, standardize penetration testing workflows, reduce tool fragmentation, increase analyst efficiency, improve consistency across engagements, and enhance the scalability of security operations. BApps allow for a balance between customization and centralized control, leading to measurable productivity improvements and supporting operational maturity by automating discovery and reducing manual workloads. | Burp |
| 2026-04-03 2026 | Burp Bounty - Scan Check Builder Extension Library for improving Burp Suite's active and passive scanners via personalized rules. It features an intuitive graphical interface for advanced pattern searching and payload enhancement, enabling users to create custom issue profiles. This extension supports the creation of unique scanning rules and integrates with Burp Collaborator for tasks like Blind RCE detection. | Burp |
| 2026-04-03 2026 | Burp Suite - Top Extensions | KSEC ARK Pentesting Knowledge Base Library of Burp Suite extensions includes tools for detecting vulnerable JavaScript libraries with Retire.js, identifying authorization flaws via Autorize, testing JOSE/JWE with JOSEPH, logging requests/responses with Logger++, and enhancing active scanning with ActiveScan++. Specific vulnerabilities mentioned include Drupalgeddon (CVE-2014-3704), Joomla SQL injection (CVE-2017-8917), WordPress SQL injection in plugins, CSRF, and numerous SSL vulnerabilities such as Heartbleed and POODLE. | Burp |
| 2026-04-03 2026 | Top 10 Must-Have Burp Suite Extensions for Web Application Security (2024) Top 10 Must-Have Burp Suite Extensions for Web Application Security (2024) | Burp |
| 2026-04-03 2026 | Top 10 Pentesting Tools and Extensions in Burp Suite | PortSwigger Library of 10 Burp Suite extensions designed to enhance penetration testing workflows, including Logger++, Autorize, Turbo Intruder, J2EEScan, Backslash Powered Scanner, Upload Scanner, Retire.js, JSON Beautifier, AuthMatrix, and Param Miner. These tools automate tasks like access control testing, bruteforcing, vulnerability detection for J2EE applications, file upload analysis, identifying outdated JavaScript libraries, JSON formatting, privilege escalation testing, and discovering hidden parameters for cache poisoning attacks. | Burp |
| 2026-04-03 2026 | Top 20 Useful Burp Suite Extensions for Web Application Pentesting Library of 20 Burp Suite extensions enhances web application penetration testing by automating tasks and discovering vulnerabilities. These tools include Param Miner for hidden parameter discovery, JS Miner for JavaScript analysis, Secret Finder for detecting exposed secrets, and 403 Bypasser for access control evasion. They also cover authorization testing with Autorize, out-of-band detection via Collaborator Everywhere, high-speed brute-forcing with Turbo Intruder, and API assessment with GraphQL Raider. Other notable extensions address JWT analysis, Java deserialization flaws, and vulnerable JavaScript library detection with Retire.js. | Burp |
| 2026-04-03 2026 | Cross-Site Scripting (XSS) Cheat Sheet - 2026 Edition | PortSwigger Cheatsheet detailing Cross-Site Scripting (XSS) vectors, regularly updated and featuring bypass techniques for WAFs and filters. It categorizes vectors by event handlers, tags, and browser compatibility, including proof-of-concept code for numerous scenarios such as JavaScript hoisting, file upload restrictions, and bypassing specific browser limitations with techniques like exception handling and template strings. | XSS |
| 2026-04-03 2026 | Access Control Vulnerabilities and Privilege Escalation | PortSwigger Reference detailing access control vulnerabilities and privilege escalation, explaining vertical and horizontal controls, context-dependent mechanisms, and common vulnerabilities such as unprotected functionality, parameter-based bypasses, and platform misconfigurations involving headers like `X-Original-URL` and `X-Rewrite-URL`. It also covers URL-matching discrepancies, including case insensitivity and the `useSuffixPatternMatch` option in Spring. | AuthZ |
| 2026-04-03 2026 | Lab: Exploiting Ruby Deserialization Using a Documented Gadget Chain | PortSwigger Library for exploiting Ruby deserialization vulnerabilities, specifically in Ruby on Rails applications. This resource details a lab environment where a documented gadget chain can be adapted to achieve remote code execution. The objective involves creating a malicious serialized object containing an RCE payload to delete a target file, leveraging a serialization-based session mechanism. | Deser |
| 2026-04-03 2026 | Exploiting Insecure Deserialization Vulnerabilities | PortSwigger Library for exploiting insecure deserialization vulnerabilities in PHP, Ruby, and Java. It covers identifying serialized data, modifying object attributes and data types for attacks, and chaining method invocations. The resource demonstrates how to exploit PHP's `serialize()`/`unserialize()` and Java's `java.io.Serializable` interface, including scenarios involving type juggling with PHP's loose comparison operator. | Deser |
| 2026-04-03 2026 | API Testing with Burp Suite: A Practical Guide Library for intercepting, modifying, and analyzing API traffic with Burp Suite, detailing techniques for REST APIs like parameter tampering and SQL injection detection in Repeater, and for GraphQL APIs, including schema introspection queries and modifying requests via dedicated GraphQL tabs. The library also highlights Burp Intruder for fuzzing and Pynt as an alternative tool. | API Sec |
| 2026-04-02 2026 | Network Penetration Testing Tools Market Is Going to Boom |? Nessus ? Burp Suite ? Metasploit Network Penetration Testing Tools Market Is Going to Boom |? Nessus ? Burp Suite ? Metasploit https://ift.tt/fCDeuAg | Burp |
| 2026-02-11 2026 | SILENTCHAIN AI - AI-Powered Security Testing Library for AI-powered offensive security, covering web applications, source code, and network infrastructure. Features include OWASP Top 10 detection via a Burp Suite extension, standalone web application scanning with CI/CD integration, and AI-powered static code analysis with PoC generation. It integrates with five AI providers, including local Ollama support, and utilizes a RAG Knowledge Engine with over 80,000 security documents. Products offer cross-product correlation for finding escalation, WAF detection and evasion for 25+ types, and out-of-band testing for XSS, SSRF, and XXE. | AIBurp |
| 2026-01-29 2026 | How I Made Burp Suite My IDOR-Finding Robot Butler (And Found 20+ Bugs) 🤖🔍 The content titled "How I Made Burp Suite My IDOR-Finding Robot Butler (And Found 20+ Bugs)" likely discusses utilizing the Burp Suite tool to automate the discovery of Insecure Direct Object Reference (IDOR) vulnerabilities, leading to the identification of over 20 bugs. The author shares their experience and strategies for leveraging Burp Suite effectively in bug hunting. The content may provide insights into the process of using automation tools for security testing and the successful outcomes achieved through this approach. | Bug BountyBurpIDOR |
| 2026-01-26 2026 | WebHackDiaries Part 4: SSRF Just completed the SSRF labs on PortSwigger Web Security Academy. Key lesson: SSRF isnt about URLs its about broken trust boundaries. On to the next labs #WebHackDiaries #SSRF #PortSwigger #WebSecurity #BugBounty #CyberSecuripic.x.com/RgANMeoaW2aW2 The content discusses completing SSRF labs on PortSwigger Web Security Academy, emphasizing that SSRF is about broken trust boundaries, not just URLs. The focus is on learning and moving on to the next labs. Key hashtags include #WebHackDiaries, #SSRF, #PortSwigger, #WebSecurity, #BugBounty, and #CyberSecuri. The post includes a link to a picture. | SSRF |
| 2026-01-24 2026 | Burp Suite | Pentest Book Burp Suite | Pentest Book | Burp |
| 2026-01-22 2026 | Testing for reflected XSS manually with Burp Suite Library for testing reflected XSS with Burp Suite's Repeater. This method involves identifying HTTP requests that reflect user input and then manipulating those requests to inject proof-of-concept XSS payloads. The technique focuses on input validation and server-side sanitization, utilizing Burp Repeater to directly modify requests and observe the immediate response for successful payload execution within HTML contexts, such as the example `alert()` function. | XSS |
| 2026-01-21 2026 | Testing for stored XSS with Burp Suite Library for manually testing stored XSS vulnerabilities using Burp Suite. It details identifying input and output points by submitting unique values and filtering HTTP history, then using Repeater to send proof-of-concept payloads like `<script>alert(1)</script>` to test for execution. | XSS |
| 2026-01-20 2026 | MantisSTS/JSReconduit: Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode. Library bridging Burp Suite traffic into VSCode for passive JavaScript reconnaissance. It captures JavaScript assets via a Burp Suite extension and performs Abstract Syntax Tree (AST) analysis within VSCode, rendering findings like API endpoints, routes, drift detection, clusters, dataflow traces, and secrets. The tool supports source-to-sink tracing, lazy chunk extraction, optional deobfuscation, and various export formats including JSON, CSV, and SARIF. Custom signature packs can be integrated for enhanced detection. | BurpRecon |
| 2026-01-19 2026 | Testing for SSRF with Burp Suite Walkthrough of testing for Server-Side Request Forgery (SSRF) using Burp Suite's Intruder. This method focuses on identifying attack vectors containing URLs, then leveraging Intruder to enumerate internal IP addresses, particularly within private ranges like `192.168.0.0/24`. The process involves modifying requests, setting up numerical payloads to probe different IP octets and ports, and analyzing response status codes and lengths to detect internal back-end systems. | SSRF |
| 2026-01-18 2026 | Testing for blind SSRF with Burp Suite Library for detecting blind SSRF vulnerabilities using Burp Suite's Collaborator. It details a workflow for identifying these flaws by injecting a Collaborator payload into HTTP requests, typically within a parameter like `productId` or a header such as `Referer`. The library guides users to monitor Collaborator interactions for out-of-band requests, confirming the SSRF vulnerability. | SSRF |
| 2026-01-16 2026 | Included Skills: 𝐛𝐮𝐫𝐩𝐬𝐮𝐢𝐭𝐞-𝐩𝐫𝐨𝐣𝐞𝐜𝐭-𝐩𝐚𝐫𝐬𝐞𝐫 - Search/extract data from Burp Suite projects 𝐝𝐢𝐟𝐟𝐞𝐫𝐞𝐧𝐭𝐢𝐚𝐥-𝐫𝐞𝐯𝐢𝐞𝐰 - Security-focused differential review of code changes The content discusses two included skills: searching/extracting data from Burp Suite projects and conducting a security-focused differential review of code changes. These skills are valuable for individuals involved in cybersecurity or software development. The link provided likely offers more detailed information on these skills. | Burp |
| 2026-01-02 2026 | repplus/rep: rep+ — Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks Library: rep+ is a Chrome DevTools extension mimicking Burp's Repeater, enhanced with AI. It captures and replays HTTP requests without proxy setup, offering features like multi-tab capture, hierarchical grouping, and robust filtering. Built-in AI can explain requests, suggest attack vectors, and modify requests directly. It supports detailed secret and endpoint extraction, parameter risk assessment, and generates Postman collections. rep+ integrates with Claude, Gemini, and Ollama, featuring a chat interface for contextual analysis across multiple requests, and offers extensive theming options. | Burp |
| 2025-12-30 2025 | Teycir/BurpAPISecuritySuite: Burp Suite extension for API security testing with 15 attack types, 108+ payloads, intelligent fuzzing, BOLA/IDOR detection, AI integration, and automated reconnaissance. Supports REST/GraphQL/SOAP APIs with Nuclei, Turbo Intruder, and external tool integration. OWASP API Top 10 coverage. Library for comprehensive API security testing within Burp Suite. It consolidates 15 attack types, including BOLA, IDOR, SQLi, and GraphQL specific vulnerabilities, leveraging over 108 payloads and intelligent fuzzing. Features include automated reconnaissance, smart normalization of API endpoints, AI integration for payload generation, and seamless integration with external tools like Nuclei, Turbo Intruder, HTTPX, and SQLMap. It covers the OWASP API Top 10 and offers differential-first logic coverage and token lifecycle drift analysis. | API SecBurpFuzzingGraphQL |
| 2025-12-12 2025 | I completed the @WebSecAcademy lab: Blind SSRF with Shellshock exploitation my first Expert-level lab! Huge thanks to @PortSwigger this one was intense and super fun. #BugBounty #SSRF #securitymindset portswigger.net/web-security/sGpic.x.com/coygKcXqSrSr The content highlights the completion of an Expert-level lab on Blind SSRF with Shellshock exploitation by @WebSecAcademy. The individual expresses gratitude to @PortSwigger for the intense and enjoyable experience. The post includes hashtags #BugBounty, #SSRF, and #securitymindset. The link provided leads to web-security information. | SSRF |
| 2025-12-09 2025 | Day 20/30 SSRF forged on @PortSwigger! Scanned internals bypassed blacklists blind exfil 2 labs owned including OOB chains. Takeaway: Never trust user-supplied URLs without validation! #SSRF #WebSecurity #PortSwiggerAcademy #BugBounty #EthicalHacking @ethivolt pic.x.com/VKIxogbRG0 Day 20/30 of SSRF testing on @PortSwigger resulted in bypassing blacklists, blind exfiltration, and owning 2 labs with OOB chains. Key takeaway: Always validate user-supplied URLs to prevent SSRF attacks. #SSRF #WebSecurity #PortSwiggerAcademy #BugBounty #EthicalHacking @ethivolt. | SSRF |
| 2025-11-04 2025 | DAY 3-5/30 Deep-dive on SSRF research to strengthen real-world exploitation skills Completed 2/18 SQLi labs on @PortSwigger #BugBounty #SSRF #SQLi #WebSecurity #Infosec The content highlights progress made on days 3-5 of a 30-day deep dive into SSRF research to enhance real-world exploitation skills. It mentions completing SQL injection labs on @PortSwigger on February 18. The focus is on bug bounty, SSRF, SQLi, web security, and infosec. The post indicates active engagement in cybersecurity research and skill development in the context of bug bounty programs. | SSRF |
| 2025-11-03 2025 | Completed my first basic SSRF lab on #PortSwigger today. Used an #SSRF to make the server request http://localhost which let me reach the internal /admin #endpoint and delete a user without admin #credentials. #hacking #security The content describes completing a basic SSRF lab on PortSwigger, utilizing SSRF to send a server request to http://localhost, accessing the internal /admin endpoint, and deleting a user without admin credentials. The post highlights the hacking and security aspects of this exercise. | SSRF |
| 2025-11-03 2025 | Completed my first basic SSRF lab on #PortSwigger today. Used an #SSRF to make the server request http://localhost which let me reach the internal /admin #endpoint and delete a user without admin #credentials. #hacking #security The content discusses completing a basic SSRF lab on PortSwigger by using SSRF to send a server request to http://localhost, accessing the internal /admin endpoint, and deleting a user without admin credentials. This demonstrates a security vulnerability that could be exploited for unauthorized actions. The post highlights the importance of understanding and securing against SSRF attacks in the context of hacking and security. | SSRF |
| 2025-10-30 2025 | DAY 1/30 - SSRF learning path completed on @PortSwigger Web Security Academy. #SSRF #WebSecurity The user completed the SSRF learning path on PortSwigger Web Security Academy on the first day of a 30-day challenge. The achievement was shared on social media with hashtags #SSRF and #WebSecurity. | SSRF |
| 2025-09-23 2025 | Server leaking secrets? Thats SSRF! Conquered Intro to SSRF on @TryHackMe. Tips: 1) Tweak URL params (e.g. 127.0.0.1) for recon. 2) Use Burp Collaborator for blind SSRF. 3) Whitelist URLs. Whos next? #CyberSec #SSRF #TryHackMe The content discusses Server-Side Request Forgery (SSRF) vulnerabilities and provides tips for exploiting them, such as manipulating URL parameters for reconnaissance, utilizing Burp Collaborator for blind SSRF attacks, and whitelisting URLs for protection. The author shares their success in mastering an "Intro to SSRF" challenge on TryHackMe and encourages others to try it. The post is tagged with #CyberSec, #SSRF, and #TryHackMe. | SSRF |
| 2025-08-28 2025 | SSRF Tip: Test with payloads like or AWS . Use DNS loggers (Burp Collaborator) for blind SSRF. Prevention: whitelist domains #SSRF #BugBounty #WebSecurity #EthicalHacking The content provides a tip for testing SSRF vulnerabilities using payloads like `http://169.254.169.254` or AWS. It suggests using DNS loggers like Burp Collaborator for blind SSRF testing. Prevention advice includes whitelisting domains. The post is related to SSRF, Bug Bounty, Web Security, and Ethical Hacking, emphasizing the importance of testing and securing against SSRF vulnerabilities. | SSRF |
| 2025-08-14 2025 | Crushing bugs one lab at a time! Another PortSwigger Web Security Academy challenge SSRF with Whitelist-Based Input Filter. #CyberSecurity #PortSwigger #SSRF #WebSecurity #BugBounty #TechandAction #TechInAction The content highlights a cybersecurity challenge from PortSwigger Web Security Academy focusing on SSRF with a Whitelist-Based Input Filter. The post emphasizes bug crushing in labs, showcasing a hands-on approach to cybersecurity. It also includes relevant hashtags like #CyberSecurity, #PortSwigger, #SSRF, #WebSecurity, #BugBounty, #TechandAction, and #TechInAction. The challenge aims to enhance skills in identifying and mitigating security vulnerabilities. | SSRF |
| 2025-08-14 2025 | GitHub - asciimoo/wuzz: Interactive cli tool for HTTP inspection Tool for interactive HTTP inspection. Wuzz mimics cURL's command-line arguments, enabling inspection and modification of requests copied from browser network inspectors. It supports regular expression filtering of response bodies by default, with a toggleable custom query syntax for formats like tests, and offers features such as better navigation and autocompletion. Installation is available via go get, binary releases, or package managers like apt and apk. | |
| 2025-08-14 2025 | (186) @Jhaddix Talks About Defcon, Burp Suite, Hacking, Bug Bounties and Ho The content discusses @Jhaddix's insights on Defcon, Burp Suite, hacking, bug bounties, and more in a concise manner. It likely covers topics related to cybersecurity, ethical hacking, and bug bounty programs. The content may provide valuable information and perspectives on these subjects from @Jhaddix's expertise. | Talks |
| 2025-08-14 2025 | Top 10 web hacking techniques of 2022 | PortSwigger Research Survey of the top 10 web hacking techniques from 2022, highlighting vulnerabilities like request smuggling, client-side path traversal, and Psychic Signatures in Java. The research also covers exploiting Web3's hidden attack surface with XSS and SSRF, bypassing .NET Serialization Binders, and insecure SAML implementations leading to bytecode execution. Practical client-side path-traversal attacks are identified, alongside cache poisoning on Akamai Edge Nodes and Zimbra Email credential theft via Memcache injection. Browser-powered desync attacks and account hijacking through OAuth dirty dancing are also detailed. | Bug Bounty |
| 2025-08-14 2025 | d0ge/sign-saboteur: SignSaboteur is a Burp Suite extension for editing, sig Library for editing, signing, verifying, and attacking signed tokens within Burp Suite. It supports numerous token types including Django, ItsDangerous, Express, OAuth2 Proxy, Tornado, Ruby Rails, Nimbus JOSE + JWT, and unknown signed strings. Features include automatic detection and in-line editing, signing, and brute-force attacks against signed token implementations, with modes for known keys, fast, balanced, and deep attacks, alongside authorization attacks like user claims and wrapped user claims. | Burp |
| 2025-08-14 2025 | 254Labs/awesome-bambdas: A collection of Burp Suite Lambda Filters ~ Bambda Library of Bambdas (Burp Suite's Lambdas) that customize Burp Suite's workflow. This collection, housed in the 254Labs/awesome-bambdas GitHub repository, categorizes filters by request or response object methods. Users can switch to Bambda mode in the HTTP Proxy history's "Configure filter" menu, then copy or download a bambda to the editor. Contributions are welcomed via pull requests. | Burp |
| 2025-08-14 2025 | Burp Extension Dev Part 4: GUI Design - TCM Security Library for developing Burp Suite extensions, focusing on GUI design. This resource details how to create user interfaces for custom tools within Burp Suite, enabling security professionals to build more effective and integrated application security testing workflows. | Burp |
| 2025-08-14 2025 | GitHub - federicodotta/Burp-Suite-Extender-Montoya-Course: This repository Library containing Burp Suite extension examples built with the Montoya API. This resource offers practical code for creating plugins that inspect and modify HTTP/WebSocket traffic, add custom context menu items, and integrate active/passive scanner checks, including BChecks and custom scan checks. It covers environment setup, basic extension development, and advanced features like Collaborator integration. | Burp |
| 2025-08-14 2025 | GitHub - dwisiswant0/ngocok: ngrok Collaborator Link — yet another Burp Col Library for intercepting out-of-band requests, serving as an alternative to Burp Collaborator by leveraging ngrok. It allows users to establish ngrok tunnels for capturing HTTP or TCP requests, with authentication managed via an authtoken flag, NGROK_AUTHTOKEN environment variable, or the ngrok configuration file. Ngocok can also log incoming requests to a specified file. | Burp |
| 2025-08-14 2025 | Burp Extension Dev Part 1: Setup & Basics - TCM Security Library for developing Burp extensions, this guide focuses on setup and basic functionalities, aiming to equip users with practical skills for uncovering vulnerabilities like injection flaws and broken access controls within web applications, ultimately strengthening security posture. | Burp |
| 2025-08-14 2025 | Writing Burp Bambda Filters Like a Boss Library for creating custom Burp Suite Proxy HTTP history filters using Java snippets. This feature, named "Bambdas," allows for advanced filtering beyond standard options, such as identifying specific JWT algorithms like HS512 within Authorization headers. Users can write and save these filters via the UI, leveraging interfaces like `ProxyHttpRequestResponse` and `Utilities` for complex request analysis. | Burp |
| 2025-08-14 2025 | synfron/ReshaperForBurp Extension for Burp Suite that allows triggering actions and reshaping HTTP request/response and WebSocket traffic via configurable Rules. These Rules process messages based on criteria like content type, event direction, source tool, scope, and text matches, executing actions such as building HTTP messages, dropping connections, extracting values, logging, prompting, running scripts, saving files, and setting variables. It supports sharing values across rules and can be built and run within IntelliJ for debugging. | Burp |
| 2025-08-14 2025 | Improve your API Security Testing with Burp BCheck Scripts Library for Burp Suite Professional that enables API security testing automation through BCheck scripts. These scripts, written in BSL, allow automated requests, response validation, Collaborator interaction, and programmatic payload injection. The library simplifies creating custom checks, like detecting missing Authorization headers (CWE-864), by integrating with Burp's scanner engine, thus accelerating manual testing workflows and improving efficiency. | Burp |
| 2025-08-14 2025 | DNS Analyzer - Finding DNS vulnerabilities with Burp Suite - SEC Consult Burp extension for discovering DNS vulnerabilities in web applications, leveraging Burp Collaborator to analyze DNS name resolution. The tool helps identify predictable UDP source ports and DNS IDs, key indicators for Kaminsky-style DNS cache poisoning attacks. Users generate a unique collaborator domain, trigger DNS resolutions (e.g., via user registration or password reset), and analyze interaction data through scatter plots and statistical metrics like standard deviation and direction bias to assess the predictability of DNS query parameters. | Burp |
| 2025-08-14 2025 | 7 Essential Burp Extensions for Hacking APIs - Security Boulevard Extensions for Burp Suite that enhance API security testing, including Logger++ for advanced log filtering and analysis, OpenAPI Parser for generating baseline requests from documentation, Param Miner for discovering hidden parameters, Autorize for detecting authorization flaws like BOLA/IDOR, JOSEPH for tampering with JWTs, Content Type Converter for format manipulation to find XXE and other vulnerabilities, and Attack Surface Detector for mapping risk levels. | Burp |
| 2025-08-14 2025 | Burp Suite: The Basics TryHackMe Writeup The content is about a writeup on using Burp Suite for basic tasks on TryHackMe. Burp Suite is a popular web application testing tool used for security assessments. The writeup likely covers introductory information, tutorials, and practical exercises related to using Burp Suite in a simulated hacking environment provided by TryHackMe. This content is likely to provide insights into how to use Burp Suite effectively for testing and securing web applications. | Burp |
| 2025-08-14 2025 | https://github.com/lucsemassa/burp_bug_finder Library for automated web vulnerability discovery within Burp Suite. This Python-based plugin focuses on identifying XSS and error-based SQL injection vulnerabilities. It automatically injects payloads into intercepted requests, including parameters and cookies, and analyzes responses for malicious patterns or SQL error messages. Users can configure targets via the scope and receive alerts in the Burp Suite dashboard for identified issues. Installation requires Jython. | Burp |
| 2025-08-14 2025 | Vulnerabilities detected by Burp Scanner - PortSwigger The content provided is a title mentioning vulnerabilities detected by Burp Scanner, a web vulnerability scanner developed by PortSwigger. It suggests that the focus is on identifying security weaknesses in web applications through the use of this tool. The summary lacks detailed information about specific vulnerabilities or how they are detected, but it highlights the importance of using tools like Burp Scanner to enhance the security of web applications. | Burp |
| 2025-08-14 2025 | botesjuan/Burp-Suite-Certified-Practitioner-Exam-Study The content appears to be a study guide or resource related to preparing for the Burp Suite Certified Practitioner Exam. It seems to be created by a user named botesjuan. The content likely includes information, tips, and resources to help individuals study and prepare for the certification exam. | Burp |
| 2025-08-14 2025 | xnl-h4ck3r/GAP-Burp-Extension Extension for Burp Suite that identifies additional potential parameters, links for testing, and generates target-specific wordlists for fuzzing. It enhances the original `getAllParams` extension by supporting various parameter types like XML and GraphQL, and offers modes for finding parameters, words, and improved link discovery. Installation involves setting up Jython, installing required modules via `pip`, and loading the `GAP.py` script within Burp. | Burp |
| 2025-08-14 2025 | nccgroup/AutoRepeater: Automated HTTP Request Repeating With Burp Suite Library for Burp Suite that automates HTTP request repeating, streamlining authorization testing. It allows researchers to duplicate, modify, and resend requests with conditional replacements for headers, cookies, and parameters. Unlike AuthMatrix, Authz, and Autorize, AutoRepeater offers general-purpose replacements and a familiar interface, facilitating testing for issues like account takeover or privilege escalation by automatically evaluating response differences. | Burp |
| 2025-08-14 2025 | My First Burp Suite Extension Library for developing custom Burp Suite extensions in Java. This project details the creation of a simple extension that checks for specific HTTP response headers, demonstrating how to set up the development environment, implement `IBurpExtender` and `IScannerCheck` interfaces, and define custom `IScanIssue` objects for reporting findings. The code is available on GitHub. | Burp |
| 2025-08-14 2025 | The Top 8 Burp Suite Extensions - Think outside the box The content briefly mentions the top 8 Burp Suite extensions, encouraging users to think creatively and explore beyond the standard features of the tool. It suggests that by utilizing these extensions, users can enhance their security testing capabilities and discover new ways to improve their testing processes. The emphasis is on expanding one's toolkit and considering innovative approaches to maximize the benefits of using Burp Suite. | Burp |
| 2025-08-14 2025 | Open Security Research: Extending Burp Proxy With Extensions The content discusses open security research focused on extending Burp Proxy with extensions. It likely explores the development and implementation of additional functionalities or features within Burp Proxy to enhance its capabilities for security testing and analysis. The article may delve into the benefits, methods, and potential outcomes of extending Burp Proxy through the use of extensions, aiming to provide insights and guidance for security researchers and professionals seeking to optimize their security testing tools. | Burp |
| 2025-08-14 2025 | PortSwigger Web Security Blog: Writing your first Burp Suite extension Library for writing Burp Suite extensions, detailing the creation of both Java and Python plugins. It guides users through setting up an IDE, exporting Burp's Extender interface files, writing basic `BurpExtender` code, compiling Java JARs, and configuring Jython for Python extensions. The entry also notes potential `OutOfMemoryError` issues with Python extensions and suggests solutions. | Burp |
| 2025-08-14 2025 | Web App Pentesting With Burp Suite Scan Profiles | White Oak Guide to optimizing Burp Suite scan profiles for web application penetration testing. It details how to configure profiles to enhance efficiency and effectiveness during security assessments, ensuring comprehensive coverage of potential vulnerabilities. | Burp |
| 2025-08-14 2025 | https://portswigger.net/blog/some-of-the-best-burp-extensions-as-chosen-by-you Extensions from the Burp Suite BApp Store are highlighted, including Autorize for testing authentication vulnerabilities, Turbo Intruder for high-speed automated attacks, Hackvertor for tag-based encoding and escaping, Burp Bounty for custom scan checks, and Param Miner for identifying hidden parameters to hunt for web cache poisoning. | Burp |
| 2025-08-14 2025 | Great getting started resources for new users of Burp Suite Professional | Library of resources for new Burp Suite Professional users, including video tutorials on UI basics and Scanner setup, blog posts detailing exclusive features like Intruder and Collaborator client, and the free Web Security Academy with learning paths on SQL injection and other topics. Community content from creators like InsiderPhD, webpwnized, and STÖK showcases practical applications, alongside the BApp Store for extensions and Extender documentation for custom development. | Burp |
| 2025-08-14 2025 | https://www.whiteoaksecurity.com/web-app-pentesting-burp-suite-scan-profile/ Profile for Burp Suite web application penetration testing, detailing how to configure scans to effectively identify vulnerabilities. This profile emphasizes a security-led approach, offering comprehensive IT services, penetration testing, and risk management solutions. It guides companies from initial assessment and practical implementation to ongoing support and strategic security elevation, advising on regulatory compliance standards. | Burp |
| 2025-08-14 2025 | Authentication Token Obtain and Replace (ATOR) Burp Plugin: Fast and Reliab The content is about the Authentication Token Obtain and Replace (ATOR) Burp Plugin, which is described as fast and reliable. It likely focuses on a tool or extension that aids in obtaining and replacing authentication tokens within the Burp Suite software. The plugin is designed to streamline the process of managing authentication tokens, enhancing efficiency and reliability in security testing and web application assessments. | Burp |
| 2025-08-14 2025 | BurpSuite Extensions: Some Favorites - VDA Labs Library of Burp Suite extensions offering enhanced application security testing. Features include Taborator for out-of-band interactions, beautifiers for response readability, Active Scan++ and Additional Scanner Checks for broader issue detection, Freddy for deserialization vulnerabilities, HTML5 Auditor, CSP-Bypass for header analysis, AWS Security Checks, Retire.js for outdated JavaScript, SSL Scanner for TLS assessment, J2EEScan for J2EE vulnerabilities (including CVE-2010-1871, CVE-2011-2730, and S2-016), Error Message Checks, Software Vulnerability Scanner using Vulners.com API, CSRF Scanner, Collaborator Everywhere for backend interaction discovery, and Upload Scanner for file upload bypasses. | Burp |
| 2025-08-14 2025 | Burp Share Requests - PortSwigger Extension for Burp Suite that generates shareable links to specific HTTP requests. Users can right-click requests in various Burp tabs and select "create link" to add them to the "Burp Share Requests" tab. From there, HTML or direct browser links can be generated for easy sharing with other Burp Suite users, streamlining collaboration and analysis of captured traffic. | Burp |
| 2025-08-14 2025 | https://www.infosecurity-magazine.com/news/portswigger-launches-web-security/ Academy providing free, interactive labs and reading materials for web security training. Developed by PortSwigger, makers of Burp Suite, it addresses the global cybersecurity talent shortage. The platform offers continuously updated content on topics like clickjacking, WebSocket, HTTP request smuggling, server-side request forgery, and XXE injection, in a safe, risk-free testing environment. Users can track progress and compete on leaderboards. | Burp |
| 2025-08-14 2025 | https://github.com/snoopysecurity/awesome-burp-extensions Library of curated Burp extensions enhancing security testing capabilities. This extensive list includes tools for passive and active scanning, such as ActiveScan++, Burp Vulners Scanner, and J2EEScan. It also features extensions for specific vulnerabilities like CSRF, HTML5 security risks, Java deserialization, and Log4Shell (CVE-2021-44228), alongside utilities for Content Security Policy bypass, HTTP request smuggling, and GraphQL security testing with InQL Scanner. Extensions are categorized for easy navigation, covering areas like Cloud Security, OAuth, Information Gathering, and Web Application Firewall Evasion. | Burp |
| 2025-08-14 2025 | Using Burp to Test a REST API | Burp Suite Support Center Guide to testing REST APIs using Burp Suite, demonstrating how to identify API endpoints and map the attack surface by proxying traffic and analyzing JSON or XML responses. The guide details using the Repeater tab to identify vulnerable parameters, such as those susceptible to arithmetic evaluation, and then performing SQL injection attacks by crafting specific SQL syntax to verify vulnerabilities. | Burp |
| 2025-08-14 2025 | https://www.kitploit.com/2018/11/aes-killer-v30-burp-plugin-to-decrypt.html?utm_source=dlvr.it&utm_medium=twitter&m=1 The content discusses AES Killer v3.0, a Burp Suite plugin designed to decrypt AES encrypted traffic in real-time. It allows security professionals to analyze encrypted traffic and identify potential vulnerabilities. The plugin can be used to decrypt HTTPS traffic and view the plaintext data for security testing purposes. This tool enhances the capabilities of Burp Suite for security researchers and penetration testers. | Burp |
| 2025-08-14 2025 | PortSwigger/param-miner Extension that identifies hidden, unlinked parameters, significantly aiding in the discovery of web cache poisoning vulnerabilities. Param Miner employs advanced diffing logic and a binary search technique to probe up to 65,000 parameter names per request, drawing from both a built-in wordlist and harvested terms from in-scope traffic. It integrates seamlessly with Burp Suite, reporting findings as scanner issues in Pro versions or listing them under the Extender tab, and supports scalable multi-request attacks and auto-mining of traffic. | Burp |
| 2025-08-14 2025 | GitHub - nccgroup/BurpSuiteHTTPSmuggler: A Burp Suite extension to help pen Extension for Burp Suite designed to assist pentesters in bypassing Web Application Firewalls (WAFs) or assessing their efficacy through various HTTP request encoding techniques. Developed by NCC Group, its initial release (v0.1) focuses on the complex task of encoding, with future versions planned to incorporate additional bypass methods. | Burp |
| 2025-08-14 2025 | The Top 5 Burp Suite Extensions Library of Burp Suite extensions enhancing penetration testing capabilities. This collection highlights tools like XSS Validator for accurate vulnerability identification, Burp Notes for organized documentation, Sentinel as a free alternative scanner, Random IP Address Header to bypass WAFs, and Bupy/Python Scripter for custom script development, ultimately boosting researcher productivity and profitability. | Burp |
| 2025-08-14 2025 | SleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Po SleuthQL is a Burp Suite tool designed for parsing history to uncover potential SQL injection vulnerabilities. It aids in identifying security flaws related to SQL injection by analyzing Burp's history. | Burp |
| 2025-08-14 2025 | https://portswigger.net/web-security/sql-injection/cheat-sheet Cheatsheet of SQL injection syntax for common attack tasks, including string concatenation, substring extraction, query truncation with comments, database version and content enumeration, conditional errors, batched queries, time delays, DNS lookups, and DNS lookup with data exfiltration, useful for formulating complex attacks and exfiltrating sensitive information. | SQLi |
| 2025-08-14 2025 | https://www.hackingarticles.in/burp-suite-for-pentester-hackbar/ Library for Burp Suite that accelerates manual penetration testing by automating payload insertion for various vulnerabilities. HackBar offers dropdown lists with pre-defined payloads for SQL Injection, Cross-Site Scripting, Local File Inclusion, XXE Injection, and OS Command Injection, streamlining the process of testing and exploiting these common web application flaws. | BurpXSSXXE |
| 2025-08-14 2025 | https://portswigger.net/web-security/xxe Library detailing XML external entity (XXE) injection, a web security vulnerability allowing attackers to interfere with XML data processing. It covers exploiting XXE to retrieve files, perform server-side request forgery (SSRF), and exfiltrate data via blind XXE techniques. The library also discusses XInclude attacks and XXE vulnerabilities in file uploads, specifically mentioning SVG format. | XXE |
| 2025-08-14 2025 | br3akp0int/GQLParser: A repository for GraphQL Extension for Burp Suite Extension for Burp Suite that automatically detects and parses GraphQL requests, presenting dynamic user input parameters in a structured format for easier payload injection. This tool simplifies the process of tampering with GraphQL queries by allowing testers to edit queries directly within Burp Suite and send them to Repeater for further analysis and vulnerability testing. It aims to integrate with Burp's Scanner to facilitate integer scanning and optimize the scanner for reduced bad requests, with ongoing development for core GraphQL vulnerability scanning. | GraphQL |
| 2025-08-14 2025 | https://portswigger.net/research/our-favourite-community-contributions-to-the-xss-cheat-sheet Reference highlights seven community contributions to the XSS cheat sheet, including @hahwul's missing pointer events, @p4fg's Vue `v-if` vector, @NotSoSecure's AngularJS restriction bypass, @kachakil's AngularJS fix, @davwwwx's attribute injection, @laytonctf's `onbeforeinput` event, and @ladecruze's top-ranked payload using `location`, `atob`, and tagged template strings, with variants utilizing `unescape` and `String.fromCodePoint`. | XSS |
| 2025-08-14 2025 | Documenting the impossible: Unexploitable XSS labs | PortSwigger Research Labs detailing unexploitable XSS scenarios, including challenges like unclosed tag bypasses, JavaScript variable injections with escaped characters, query string processing with `innerHTML`, attribute length limitations, frameset injections, and minimal arbitrary code execution via `alert()`. These labs, presented as challenges on the PortSwigger XSS cheat sheet, aim to solidify understanding when exploitation proves difficult, offering confidence that a vulnerability may indeed be unexploitable if matching these specific, tricky conditions. | XSS |
| 2025-08-14 2025 | (509) Find and Exploit Server-Side Request Forgery (SSRF) Using Burp Suite The content is about utilizing Burp Suite to discover and exploit Server-Side Request Forgery (SSRF) vulnerabilities. SSRF allows attackers to make requests on behalf of the server, potentially accessing sensitive data or services. Burp Suite, a popular web vulnerability scanner, can help identify SSRF vulnerabilities in web applications, enabling security professionals to address and mitigate these risks. By understanding how SSRF works and using tools like Burp Suite, security experts can enhance the protection of web applications against potential exploits. | SSRF |
| 2025-08-14 2025 | Server-Side Request Forgery (SSRF)- PortSwigger Labs | by Michael Koczwara The content is about Server-Side Request Forgery (SSRF) and is part of PortSwigger Labs. It likely discusses the concept of SSRF, which is a type of vulnerability that allows attackers to manipulate server requests from the server side. The article may cover how SSRF attacks work, their impact on security, and potential mitigation strategies. It is written by Michael Koczwara and is likely to provide insights and guidance on understanding and addressing SSRF vulnerabilities in web applications. | SSRF |
| 2025-07-12 2025 | Blind SSRF via Burp Collaborator 1 App fetches URLs (PDF gen webhook etc.) 2 Send URL pointing to Burp Collaborator 3 No visible response but OAST logs the request 4 Confirms SSRF vulnerability No output no bug #bugbounty #ssrf #burp #oast The content discusses a method for exploiting a Blind SSRF vulnerability using Burp Collaborator. It involves sending URLs to Burp Collaborator through an application that fetches URLs like PDF generation or webhooks. Despite no visible response, the Out-of-Band Application Security Testing (OAST) logs the request, confirming the SSRF vulnerability. The key takeaway is that even if there is no visible output, the presence of an SSRF vulnerability should not be overlooked. This information is relevant for bug bounty hunters and those interested in web security testing. | SSRF |
| 2025-06-28 2025 | Server-Side Bugs That Pay Big SSRF (internal request abuse) SSTI (template injection) XXE (XML Entity Injection) Log4Shell-style payloads Blind bugs with Burp Collaborator Quiet bugs massive impact. #BugBounty #SSRF #EthicalHacking #bugbountytip The content discusses lucrative server-side bugs like SSRF, SSTI, XXE, Log4Shell-style payloads, and blind bugs with Burp Collaborator. These vulnerabilities can have a significant impact and are valuable for bug bounty programs and ethical hacking. Emphasizing the importance of identifying and addressing these issues, the post highlights their potential for exploitation and the need for vigilance in cybersecurity. | SSRF |
| 2025-05-08 2025 | Completed Server-Side Vulnerabilities Learning Path at PortSwigger Thrilled to finish PortSwigger's Server-Side Vulnerabilities path gaining insight into web system exploits. #WebSecurity #CyberSec #PortSwigger #Learning #SQLInjection #SSRF #Auth #Vulns The content highlights the completion of the Server-Side Vulnerabilities Learning Path at PortSwigger, expressing excitement at gaining insights into web system exploits like SQL injection, SSRF, and authentication vulnerabilities. The individual is thrilled to finish the learning path and shares hashtags related to web security, cybersecurity, learning, and PortSwigger. | SSRF |
| 2025-04-30 2025 | #burp #pentest #ai #hackerassociate #cybersecurity #infosec… | Harshad Shah Setting Up #Burp MCP Server on Claude Desktop
#Pentest Modern App with #Ai
⇢ Learn how to set up a 𝗕𝘂𝗿𝗽 𝗠𝗖𝗣 𝗦𝗲𝗿𝘃𝗲𝗿 on your 𝗖𝗹𝗮𝘂𝗱𝗲 𝗱𝗲𝘀𝗸𝘁𝗼𝗽 in this easy-to-follow tutorial.
⇢ Get your server up and... | AIBurpTalks |
| 2025-04-03 2025 | Sticky Burp, Reusable and Replaceable Environment Variables Library for managing reusable environment variables ("stickies") within Burp Suite. This tool allows users to capture selected text from request and response panes across various Burp tabs, such as Proxy and Repeater. Stickies are stored with names, values, source information, and notes, enabling quick replacement of payload content with these stored variables, useful for exploit server URLs, authentication tokens, or dynamic response data. Professional editions persist stickies across Burp projects. | Burp |
| 2025-03-10 2025 | GitHub - vsec7/BurpSuite-Xkeys: A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage. Extension for Burp Suite that passively scans webpages to extract sensitive strings like keys, secrets, and tokens. It lists these findings as information issues within Burp's issues box and output extender, aiding in the identification of potential security vulnerabilities by highlighting credential leakage. | BurpSecrets |
| 2025-03-08 2025 | GitHub - trufflesecurity/trufflehog-burp-suite-extension: Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc) using TruffleHog. Extension for Burp Suite that scans HTTP traffic for over 800 types of secrets, including API keys, passwords, and SSH keys, leveraging TruffleHog. It operates by writing traffic to temporary files and invoking TruffleHog scans every 10 seconds, reporting findings in a dedicated tab. The extension supports secret verification and can be configured to scan various Burp Suite traffic sources. | BurpSecrets |
| 2025-02-05 2025 | SSRF: Anatomy of a Cloud Attack @ Cloud Village | @seasides_conf 2025! Join @Zero0x00 as he explores SSRF attacks with Burp Suite & AWS Metadata. A must-attend for cloud security pros! 22 Feb 2025 #CloudSecurity #SSRF #Seasides2025 The content discusses an upcoming session at the Cloud Village event at the Seasides Conference 2025, focusing on SSRF attacks using Burp Suite and AWS Metadata. Led by @Zero0x00, the session is aimed at cloud security professionals and is scheduled for February 22, 2025. It emphasizes the importance of understanding SSRF attacks in cloud security. Attendees are encouraged to join to gain insights into this critical aspect of cloud security. | SSRF |
| 2025-02-03 2025 | Nowy odcinek na YouTube! Jak działa SSRF (Server-Side Request Forgery) i jak atakujący mogą manipulować żądaniami HTTP? Sprawdź jak wykrywać i testować tę podatność! Obejrzyj teraz: #SSRF #Cybersecurity #BurpSuite #Pentesting #WebSecurity The content discusses a new YouTube episode about SSRF (Server-Side Request Forgery), explaining how attackers manipulate HTTP requests and how to detect and test this vulnerability. It invites viewers to watch the episode to learn more about SSRF, cybersecurity, BurpSuite, pentesting, and web security. The link provided directs viewers to the YouTube video. | SSRF |
| 2025-02-01 2025 | Looking for a Burp Collaborator alternative for SSRF testing? Bug bounty hunters & pentesters Interactsh is a must-have for SSRF exploitation web security and bug bounties. #BugBounty #PenetrationTesting #SSRF #HackingTools #ProjectDiscovery Interactsh is recommended as a Burp Collaborator alternative for SSRF testing by bug bounty hunters and pentesters. It is considered essential for SSRF exploitation, web security, and bug bounties. The tool is highlighted for its effectiveness in these areas and is associated with Bug Bounty, Penetration Testing, SSRF, Hacking Tools, and Project Discovery. | SSRF |
| 2025-02-01 2025 | A Burpsuite Extension For JS Reconnaissance - Jsmon Extension for Burpsuite that integrates Jsmon's JavaScript scanning and monitoring capabilities, automatically analyzing HTTP history for client-side exposures and secrets. Features include automatic or manual analysis, scope filtering to optimize API calls, and seamless integration within Burpsuite's workflow for enhanced web security testing. | BurpRecon |
| 2025-01-30 2025 | BChecks - IntelliJ IDEs Plugin | Marketplace Provides support for the BCheck language, used to provide custom scan checks for Burp Suite Professional and Burp Suite Enterprise. Key features: Syntax highlighting... | Burp |
| 2025-01-28 2025 | GitHub - IckoGZ/burp-deepseek: A quick and dirty (and a little shitty) burp extension that uses cheap deepseek api to send request and response and maybe found something interesting. Library integrating the DeepSeek API into Burp Suite for AI-driven security analysis. This beta-stage plugin allows users to send HTTP requests and responses from Burp Suite's Proxy or Repeater to DeepSeek for vulnerability detection and sensitive data identification. It features context menu integration, asynchronous API calls, customizable prompts, and generates "DeepSeek Analysis" issues within Burp's Scanner. | Burp |
| 2025-01-15 2025 | Blind #SSRF vulnerabilities can be detected by monitoring response times & using out-of-band techniques like DNS/HTTP callbacks. Set up a Burp Collaborator or interactsh server to catch those internal network calls. #InfoSec #BugBounty #WebSecurity Blind SSRF vulnerabilities can be identified by monitoring response times and utilizing out-of-band techniques like DNS/HTTP callbacks. Setting up a Burp Collaborator or interactsh server can help capture internal network calls. This approach enhances information security, aids in bug bounty programs, and strengthens web security measures. | SSRF |
| 2025-01-12 2025 | Quick and dirty way to find parameters vulnerable to LFI & Path Traversal & SSRF & Open Redirect: Burp Search Regex \?.=(\/\/?\w|\w\/|\w(%3A|:)(\/|%2F)|%2F|[\.\w]\.\w{24}[\w]) And find potentially vulnerable SSRF params - https://t.co/6cfBPVn0FM #SSRF #cybersec https://t.co/ipnHHHaID4 The content discusses a method using Burp Search Regex to identify parameters vulnerable to LFI, Path Traversal, SSRF, and Open Redirect. The provided regex pattern helps in finding potentially vulnerable SSRF parameters. The focus is on cybersecurity, specifically SSRF vulnerabilities. The content includes a link for further reference. | SSRF |
| 2025-01-09 2025 | Automated SSRF Detection! #BugBounty #SSRF #Regex #bugbountytips #burpsuite Prepare for success: 1 Use a DNS log platform (e.g. Burp Collaborator or https://t.co/UiHRbhDCC8). 2 Ready these regex patterns: The content discusses automated SSRF detection for bug bounty programs, emphasizing the use of a DNS log platform like Burp Collaborator and specific regex patterns. It suggests preparing for success by utilizing these tools and resources to enhance SSRF vulnerability detection. The post also includes relevant hashtags and a link to regex patterns for reference. | SSRF |
| 2024-12-31 2024 | GitHub - hackerassociate/SSRF-Hacks-IP-Decimal: A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad Shah. Extension that automatically converts IPv4 addresses to decimal notation, integrated into Burp Suite's context menu. This tool aids security professionals in bypassing Web Application Firewalls (WAFs) and testing Server-Side Request Forgery (SSRF) vulnerabilities by replacing standard IP formats with their decimal equivalents, logging all conversions in real-time. | BurpSSRF |
| 2024-12-16 2024 | socalledhacker: Don't want to use Burpsuite collaborator for SSRF hunting... Check this out an amazing replacement of collaborator:- #bugbounty #bug #bugbountytip #bugbountytips @cybersecurity #infosec #SSRF The content shared by socalledhacker discusses an alternative to using Burpsuite collaborator for SSRF hunting. The post highlights a replacement tool and encourages users to explore it. The hashtags used indicate the focus on bug bounty, cybersecurity, infosec, and SSRF. The post is shared on Twitter by socalledhacker. | SSRF |
| 2024-12-12 2024 | API Testing with Insomnia and Burp Suite: An Alternative to Postman Library for API testing and hacking, demonstrating how to use Insomnia and Burp Suite as an alternative to Postman. It details capturing API requests with mitmproxy, converting them to OpenAPI 3.0 format using mitmproxy2swagger for import into Insomnia, and leveraging Insomnia's features like variable management and Burp Suite integration for testing vulnerabilities such as Improper Asset Management. | API SecBurp |
| 2024-12-03 2024 | burp-extensions-montoya-api-examples/customlogger/src/main/java/example/customlogger/MyTableModel.java at main · PortSwigger/burp-extensions-montoya-api-examples Library example demonstrating how to create a custom table model within a Burp Suite extension using the Montoya API. This code snippet focuses on logging HTTP responses, specifically capturing the `toolSource` and the URL of the `initiatingRequest`, and displaying them in a tabular format. The `MyTableModel` class extends `AbstractTableModel` and manages a list of `HttpResponseReceived` objects, providing methods for adding new entries and retrieving data for display. | Burp |
| 2024-12-03 2024 | Hacking API discovery with a custom Burp extension Library for enhancing API discovery within Burp Suite, this extension dynamically generates over 4,000 potential API documentation paths, including Swagger and OpenAPI formats, and recursively checks discovered directories. It employs an exponential backoff strategy for resilient requests and utilizes parallel processing to accelerate the discovery of API documentation artifacts. | API SecBurp |
| 2024-12-03 2024 | Burp-Montoya-Utilities/src/main/java/com/coreyd97/BurpExtenderUtilities/PopOutPanel.java at master · CoreyD97/Burp-Montoya-Utilities Library code for a Burp Suite extension featuring a `PopOutPanel` component. This Java class enables users to detach and display Swing components in a separate JFrame, offering functionality to pop components in and out of their original context within the Burp Suite interface. | Burp |
| 2024-11-25 2024 | burp-extensions-montoya-api-examples/collaborator/src/main/java/example/collaborator/CollaboratorExample.java at main · PortSwigger/burp-extensions-montoya-api-examples · GitHub Library demonstrating the use of the Burp Collaborator Client API within a custom extension. This example shows how to create or restore a `CollaboratorClient`, log interactions received, register a request handler, and poll for new interactions periodically. It includes code for persisting the Collaborator secret key using `PersistedObject` to allow for client restoration across extension reloads, and graceful shutdown of the polling mechanism. | Burp |
| 2024-11-19 2024 | Joyerz5: Just Discovered a Cool SSRF!! Now working to make it Impactful!! Any tips guys? How I Found it? On the Image Upload features there was fetch image from URL guess what? Yes I put burp collaborator Link there and got HTTP DNS response back! It is confirm now! #ssrf #bugbounty The content describes a cybersecurity enthusiast, Joyerz5, who discovered a Server-Side Request Forgery (SSRF) vulnerability while testing an image upload feature. By inserting a Burp Collaborator link, they received an HTTP DNS response, confirming the SSRF. Joyerz5 is now seeking tips to maximize the impact of this finding, indicating involvement in bug bounty programs. The post highlights the importance of identifying and exploiting vulnerabilities like SSRF for security testing and rewards. | SSRF |
| 2024-10-05 2024 | Mindmap/Burp Suite/Burp Suite Normal.png at main · Ignitetechnologies/Mindmap This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them - Ignitetechnologies/Mindmap | Burp |
| 2024-10-03 2024 | Automate your API hacking with Autorize Library for automating API security testing, Autorize is a Burp Suite extension that detects broken object level authorization (BOLA) by repeatedly sending requests with different user privileges. It analyzes response changes to identify authorization and authentication issues, supporting active scans and offering configuration for interception filters and enforcement detectors. Autorize can be integrated with Repeater and customized to filter results for potential bypasses and 401 status codes, aiding in the discovery of vulnerabilities like unauthorized access to administrative functions. | API SecAuthNAuthZ |
| 2024-10-03 2024 | Top 10 Browser Extensions Every Bug Bounty Hunter Needs As bug bounty hunters, we need to save time by avoiding constant switching between the terminal, multiple tabs, Burp Suite (including… | Bug BountyBurp |
| 2024-09-21 2024 | Proving API exploitability with Burp Collaborator Library for demonstrating API exploitability using Burp Collaborator. This technique leverages out-of-band application security testing (OAST) to prove vulnerabilities like insecure deserialization, SSRF, open redirects, and blind XXE without requiring reverse shells. It works by sending crafted payloads that interact with Burp Collaborator's mock network services, capturing DNS, HTTP/HTTPS, or SMTP interactions to confirm an attack's potential. The article details how to configure and use Burp Collaborator, referencing its application in testing CVE-2023-40044 and crAPI. | API SecBurp |
| 2024-09-16 2024 | PyCript: Burp Suite extension that allows for bypassing client-side encryption Library for Burp Suite that bypasses client-side encryption by enabling manual and automated decryption/encryption of requests. PyCript allows for custom logic via JavaScript and Node.js, handles encryption keys and IVs within request headers or bodies, and integrates with Burp Scanner, SQLMap, and Intruder for testing in plain text. | BurpPython |
| 2024-09-04 2024 | @SandroBruscino: Learn how attackers bypass URL validation in SSRF attacks! PortSwigger's latest cheat sheet reveals key techniques. "Understanding these flaws is critical for defending web apps." #CyberSecurity #SSRF #WebSecurity The content discusses how attackers bypass URL validation in SSRF attacks, with PortSwigger's cheat sheet revealing key techniques. Understanding these flaws is crucial for defending web apps. The post emphasizes the importance of cybersecurity, SSRF, and web security. Sandro Bruscino's tweet highlights the significance of recognizing and preventing vulnerabilities in web applications to enhance cybersecurity measures. | SSRF |
| 2024-08-30 2024 | GitHub - e1abrador/Burp-Encode-IP: Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist. Library for Burp Suite that encodes IP addresses using various techniques like Unicode, IPv6 formats, hexadecimal, octal, and mixed integer representations. It aims to bypass application IP or domain blacklists, aiding in testing SSRF, Open Redirect, and RFI vulnerabilities. The extension also supports DNS rebinding and collaborator integration for advanced testing scenarios. | Burp |
| 2024-08-22 2024 | BChecks/vulnerability-classes/injection at main · PortSwigger/BChecks · GitHub BChecks collection for Burp Suite Professional and Burp Suite Enterprise Edition - PortSwigger/BChecks | BurpRCESQLiXSS |
| 2024-08-16 2024 | Rajan22m: I completed the Web Security Academy lab: SSRF with blacklist-based input filter @WebSecAcademy #portswigger #websecurity #lab #hacking #ethicalhacker #ethicalhacking #bug #bugbountytips #ssrf #server Rajan22m completed the Web Security Academy lab on SSRF with a blacklist-based input filter. The post includes hashtags related to web security, hacking, ethical hacking, bug bounty tips, SSRF, and servers. The completion of this lab likely signifies Rajan22m's progress and expertise in web security and ethical hacking. | SSRF |
| 2024-08-16 2024 | GitHub - 0x999-x/jsluicepp: jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic using the CLI tool jsluice Extension integrating the jsluice CLI tool with Burp Suite for passive and active scanning of JavaScript traffic. It extracts URLs, paths, and secrets from JavaScript files, offering features like context menu processing, passive proxy scanning, URL monitoring with diff detection, and sending findings to Repeater. It also supports secret detection and scoped processing. | Burp |
| 2024-08-14 2024 | basu_banakar: Thread On: Testing for Blind/Non-Blind SSRFs using redirection in integrations where there are some filters. #bugbountytips #BugBounty #ssrf #bugbountytips 1. Hit the integration by using burp collaborator by using random credentials. The content discusses testing for Blind/Non-Blind SSRFs using redirection in integrations with filters. The suggestion is to test by hitting the integration with Burp collaborator using random credentials. The post is shared on Twitter by basu_banakar. The focus is on bug bounty tips related to SSRF vulnerabilities. | SSRF |
| 2024-08-03 2024 | Testing Handbook - Burp Watch the recording Testing Handbook: Burp Suite Professional https://appsec.guide | BurpTalks |
| 2024-08-03 2024 | Mastering Web Research with Burp Suite Mastering Web Research with Burp Suite | Burp |
| 2024-08-03 2024 | Beyond the Limit: Expanding single-packet race condition with a first sequence sync for breaking the 65,535 byte limit Writeup detailing a technique to bypass the 1,500-byte single-packet attack limit for race conditions by combining IP fragmentation and TCP sequence number reordering. This method allows for the exploitation of vulnerabilities requiring a large number of simultaneous requests, potentially overcoming limitations like HTTP/2's SETTINGS_MAX_CONCURRENT_STREAMS by sending many large TCP packets out-of-order until the final packet with the first sequence number triggers simultaneous processing. | Fuzzing |
| 2024-08-02 2024 | GitHub - synacktiv/HopLa: HopLa Burp Suite Extender plugin - Adds autocompletion support and useful payloads in Burp Suite Library enhancing Burp Suite with AI-powered autocompletion, chat, and request transformation. Integrates with OpenAI, Gemini, and Ollama, offering dynamic payload insertion, collaborator domains, and custom keyword management. Supports extensive YAML-based payload customization and hotkeys for efficient testing, building upon concepts from PayloadsAllTheThings. | Burp |
| 2024-07-31 2024 | Extending Burp Suite for fun and profit - The Montoya way - Part 5 - hn security Setting up the environment + Hello […] | Burp |
| 2024-07-30 2024 | Here's how I get the most out of Burp Suite reporting Library for extracting detailed vulnerability data from Burp Suite Professional, enabling comprehensive reporting. It covers generating HTML reports from scanner findings, including full requests and responses, and exporting raw HTTP history from Proxy and Repeater tabs as XML. The library facilitates structured reporting for both technical and non-technical audiences by providing access to scan results, proxy logs, and repeater sessions, crucial for effective vulnerability communication. | Burp |
| 2024-07-30 2024 | JS Link Finder Burp Suite Extension Guide Improve your bug bounty hunting, pentesting, and appsec skills with the JS Link Finder Burp Suite Extension. Discover hidden endpoints and… | Bug BountyBurp |
| 2023-12-06 2023 | videos[1] = "GAP Burp Extension" videos[1] = "GAP Burp Extension" https://www.youtube.com/watch?v=Os3bN0zUROA | Burp |
| 2023-11-03 2023 | Burp Suite Shorts | Automatic Session Handling The content is a video titled "Burp Suite Shorts | Automatic Session Handling" available on YouTube. It likely provides a concise tutorial or demonstration on how to utilize automatic session handling within the Burp Suite tool. This feature can streamline the process of managing and maintaining sessions during security testing and web application assessments. Viewers can expect to learn how to automate session handling tasks to enhance efficiency and effectiveness in their security testing workflows. | AuthNBurp |
| 2023-11-03 2023 | Burp Suite Shorts | Automatic Session Handling Burp Suite Shorts | Automatic Session Handling https://www.youtube.com/watch?v=yoENNJjC4NY | AuthNBurp |
| 2023-10-29 2023 | PortSwigger/BChecks: BChecks collection for Burp Suite Professional Library of BChecks written in the BChecks language for Burp Suite Professional and DAST. This collection includes custom scan checks developed by PortSwigger and the community, covering vulnerabilities like Blind SSRF, exposed git directories, leaked AWS Tokens, Log4Shell, Server Side Prototype Pollution, and suspicious input transformations, with specific checks for CVE-identified vulnerabilities. Documentation, examples, and a definition reference are available for creating and testing your own BChecks. | Burp |
| 2023-10-13 2023 | Understanding File Upload Vulnerabilities in Web App Penetration Testing | 2023 Understanding File Upload Vulnerabilities in Web App Penetration Testing | 2023 https://ift.tt/8aVoHYJ | RCE |
| 2023-09-15 2023 | burp.IBurpExtenderCallbacks java code examples burp.IBurpExtenderCallbacks java code examples https://ift.tt/je1FMoP | Burp |
| 2023-09-03 2023 | Proxying Burp Traffic through VPS using SOCKS Proxy Tunnel your BurpSuite traffic through VPS to bypass restrictions using SOCKS proxy. | Burp |
| 2023-08-13 2023 | Swing in Python Burp Extensions - Part 1 Library for crafting Python Burp extensions with custom GUIs using Jython Swing. This guide details implementing tabs, `JPanel` containers with `BorderLayout`, `JButton` actions, `JSplitPane` for layout, `JScrollPane` and `JList` for displaying data, and handling `ListSelectionEvent` with `valueChanged` to prevent double-adding events. It also covers using `JTabbedPane` for multiple tabs and `JTextPane` with `StyledDocument` for styled text, as well as `JEditorPane` for displaying web content, enabling or disabling editing. | BurpPython |
| 2023-08-03 2023 | Proxying MetaSploit through BurpSuite Proxying MetaSploit through BurpSuite https://ift.tt/ZHsxq1m | Burp |
| 2023-07-02 2023 | DNS Analyzer - Finding DNS vulnerabilities with Burp Suite Library for discovering DNS vulnerabilities in web applications. This Burp Suite extension leverages Burp Collaborator to analyze DNS name resolution, helping identify potential abuse of "Forgot password?" features for account takeovers, reminiscent of Kaminsky-style attacks. It provides a Kaminsky status, scatter plots, and statistics to assess the predictability of UDP source ports and DNS IDs in DNS queries, offering a more accessible alternative to setting up dedicated DNS analysis servers. | BurpRecon |
| 2023-06-17 2023 | Web Application Hacking with Burp Suite Library of hands-on exercises for mastering Burp Suite, covering information disclosure, insecure decentralization, web socket testing, directory traversal, XXE, XSS, and SQL injection vulnerabilities. This course emphasizes practical application, guiding users through tool setup and real-world examples to equip them for comprehensive web application security testing. | Burp |
| 2023-05-29 2023 | RepeaterSearch Extension that adds a search bar to Burp Suite's Repeater tab. This tool enables users to efficiently locate requests and/or responses containing a specific string, with support for both simple text matching and regular expressions. It highlights matching repeater tabs, streamlining the process of analyzing and identifying vulnerabilities within HTTP traffic. | Burp |
| 2023-04-13 2023 | How to use Burp Suite Like a PRO? How to use Burp Suite Like a PRO? https://ift.tt/fbstnRg | Burp |
| 2023-04-09 2023 | aress31/burpgpt Library leveraging OpenAI's GPT models to detect security vulnerabilities missed by traditional scanners. BurpGPT integrates with Burp Suite, sending web traffic for analysis via customizable prompts and a placeholder system, generating automated reports of potential issues. It supports various OpenAI models, allows granular control over token usage and prompt length, and offers example use cases for tailored analysis, such as identifying CVE-related library flaws or biometric authentication vulnerabilities. | AIBurp |
| 2023-02-17 2023 | Burp Suite Extensions Rarely Utilized but Quite Useful The content discusses the underutilization of Burp Suite extensions despite their usefulness. It highlights that these extensions can enhance the functionality of Burp Suite, aiding in various security testing tasks. The article likely delves into the benefits of utilizing these extensions, such as improving efficiency, expanding capabilities, and enhancing the overall experience of using Burp Suite for security testing purposes. Overall, it emphasizes the value of exploring and incorporating these extensions into one's workflow to maximize the potential of Burp Suite. | Burp |
| 2023-02-16 2023 | A Step-by-Step Guide to Writing Extensions for API Pentesting in BurpSuite Library for creating custom BurpSuite extensions in Python, focusing on API penetration testing. It guides users through setting up a development environment with Jython, writing a basic "Hello World" extension, and then constructing a more advanced "UUID Inspector" that identifies v1 UUIDs during passive scans, registering them as issues in BurpSuite's dashboard. | Burp |
| 2022-10-13 2022 | Server-Side Request Forgery (SSRF)- PortSwigger Labs The content discusses Server-Side Request Forgery (SSRF) as presented by PortSwigger Labs. SSRF is a vulnerability that allows attackers to manipulate a server into making requests on their behalf. This can lead to unauthorized access to internal systems, data theft, or server exploitation. Understanding SSRF is crucial for developers and security professionals to prevent such attacks and secure their systems. The link provided likely offers further details or resources on SSRF from PortSwigger Labs. | SSRF |
| 2022-06-20 2022 | Favorite tweet by @Burp_Suite Favorite tweet:
Burp Suite 2022.6 released to the Early Adopter channel. Includes grouped tabs for Repeater, connection reuse for HTTP/1 requests, and new preset scan modes. Also introduces the abili... | BurpXSS |
| 2022-06-20 2022 | Favorite tweet by @PortSwigger Favorite tweet:
Finding Client-Side Prototype Pollution (CSPP) with DOM Invader by @garethheyes - now available on the Early Adopter channel https://t.co/ut1Buup1so
— PortSwigger (@PortSwigger) Jun ... | Burp |
| 2022-04-20 2022 | Favorite tweet by @Jhaddix Favorite tweet:
Asking for a friend: What's the current best low-cost, self-study, Burp Suite training out there?
— Jason Haddix (@Jhaddix) Apr 19, 2022 | Burp |
| 2022-04-14 2022 | Favorite tweet by @e11i0t_4lders0n Favorite tweet:
Burp Extension for XSS Thread 🧵 #bugbounty #bugbountytip #bugbountytips
— Tushar Verma 🇮🇳 (@e11i0t_4lders0n) Apr 14, 2022 | Bug BountyBurpXSS |
| 2022-03-21 2022 | Favorite tweet by @cedoxX Favorite tweet:
Nuclei-Burp-Plugin - A @Burp_Suite plugin intended to help with Nuclei template generation. https://t.co/wseZPcgBE0 @KitPloit #RedTeam #Tools #Cyber #Hacker #BugBounty #Hacking https:... | Burp |
| 2022-03-06 2022 | Favorite tweet by @fardeenahmed411 Favorite tweet:
Top 10 essential tools for Bug-Bounty Hunting : 1. Burp Suite / ZAP-Proxy 2. Google Dorking Script 3. DNS-Discovery 4. Reverse IP Lookup 5. Wapiti 6. INalyzer 7. IronWASP 8. Wfuzz 9. ... | Bug BountyBurpRecon |
| 2022-03-02 2022 | Favorite tweet by @ptracesecurity Favorite tweet:
Nuclei-Burp Extension: run nuclei scanner directly from burp https://t.co/5eXxgjapf7 #Pentesting #BurpSuite #WebSecurity #Infosec https://t.co/xwhsoQfhRo
— Ptrace Security GmbH (@ptr... | Burp |
| 2022-01-05 2022 | 0xInfection/XSRFProbe Toolkit for auditing and exploiting Cross-Site Request Forgery (CSRF/XSRF) vulnerabilities. XSRFProbe features a robust crawling engine and performs systematic checks to detect CSRF flaws and bypasses. It supports custom cookie values, generic headers, and accurate token-strength detection. The toolkit can generate both normal and maliciously exploitable proof-of-concept examples for identified vulnerabilities, offering detailed logging and a user-controlled workflow. | CSRF |
| 2022-01-03 2022 | BUG BOUNTY HUNTING WITH BURP SUITE BUG BOUNTY HUNTING WITH BURP SUITE | Bug BountyBurp |
| 2021-11-22 2021 | Burp Suite for Pentester: Software Vulnerability Scanner & Retire.js Library for Burp Suite, "Software Vulnerability Scanner" leverages the vulners.com API to identify software versions vulnerable via CPE fingerprints or path matching. It also includes "Retire.js" to detect outdated JavaScript libraries within web applications. | Burp |
| 2021-10-29 2021 | Improvements to Burp Suite authenticated scanning Library improvements to Burp Suite's authenticated scanning in version 2021.9.1 enhance testing of complex web applications by enabling recording and replay within iframes. The update addresses issues with animated elements, SVG icons within buttons, and JavaScript-driven redirections, improving accuracy and efficiency. It also adds support for multi-select elements, further streamlining the process of scanning privileged areas of modern web applications. | AuthZBurp |
| 2021-08-30 2021 | Web App Pentesting With Burp Suite Scan Profiles | White Oak This article is a summary of a DEF CON 32 talk on hardware fault injection. The talk covered techniques like voltage glitching and clock manipulation to bypass security mechanisms. It also discussed common hardware vulnerabilities found in embedded systems and IoT devices, and presented methods for exploiting them. | Burp |
| 2021-08-30 2021 | Web App Pentesting With Burp Suite Scan Profiles Guide on optimizing Burp Suite scan profiles for effective web application penetration testing, detailing strategies for vulnerability discovery and risk management. | Burp |
| 2021-08-25 2021 | Burp Suite for Pentester: Repeater Library for Burp Suite Professional's Repeater, enabling pentesters to modify and resend HTTP requests to analyze server responses. Features include tab renaming, changing request methods (GET, POST, etc.), navigating request history, pasting URLs directly as requests, automatic URL encoding for easier parameter handling, configurable redirection following, and search functionality within requests and responses for efficient analysis of web application behavior. | Burp |
| 2021-08-21 2021 | Why u should use burp to test Path Traversal Vulnerability and also get RXSS Why u should use burp to test Path Traversal Vulnerability and also get RXSS | BurpXSS |
| 2021-07-25 2021 | burpa: Burp Automator Library for automating Burp Suite scans, burpa offers a high-level CLI and Python interfaces to launch Dynamic Application Security Testing (DAST) scans. It utilizes the official REST API for scan execution and report generation, supporting authenticated scans with application credentials. Configuration can be managed via environment variables or `.env` files. Burpa provides commands for scanning URLs, generating reports, scheduling scans, stopping Burp Suite, and testing API connectivity. | Burp |
| 2021-07-19 2021 | Leveraging Burp Suite extension for finding IDOR(Insecure Direct Object Reference). This content describes using a Burp Suite extension to discover Insecure Direct Object References (IDORs). IDOR vulnerabilities allow attackers to access unauthorized data by manipulating object references. The extension likely automates or streamlines the process of identifying these weaknesses. No specific bounty payout amount is mentioned in this content. | BurpIDOR |
| 2021-06-05 2021 | Automating Burp Suite -4 | Understanding And Customising Custom Header From The content discusses the creation of a Burp Extension using Jython to automate Burp Suite tasks. Specifically, it focuses on adding custom headers to requests. This is the fourth tutorial in the series, emphasizing understanding and customizing custom headers. The tutorial likely provides step-by-step instructions on how to implement this feature within Burp Suite for automated testing and customization purposes. | Burp |
| 2021-05-05 2021 | PimpMyBurp PimpMyBurp is a collection of Burp Suite extensions designed to enhance its functionality. It provides a variety of tools to improve the efficiency of security professionals. These extensions offer features for tasks such as advanced scanning, request manipulation, and data analysis, ultimately aiding in the discovery and exploitation of vulnerabilities. | Burp |
| 2021-05-04 2021 | Detecting and annoying Burp users Technique for detecting and disrupting Burp Suite usage, including methods for identifying the web interface via favicon MD5 hashes and localhost resolution, detecting TLS man-in-the-middle with PortSwigger issuer checks and JA3 fingerprinting, exploiting infinitely chunked responses, enumerating EventListeners to detect browser extensions, and leveraging Brotli compression and user-agent discrepancies. It also details ways to break Burp's crawler with unusual characters, confuse its active scanner with delays and collaborator interactions, bypass decoding, and exploit Intruder's marker character handling with PHP. | Burp |
| 2021-04-22 2021 | Web App Pentesting With Burp Suite Scan Profiles | White Oak Reference for configuring Burp Suite scan profiles to enhance web application penetration testing. This document, from White Oak Security, focuses on practical application of Burp Suite features to identify vulnerabilities efficiently. | Burp |
| 2020-12-03 2020 | My First Burp Suite Extension Library for creating custom Burp Suite extensions, written in Java. This resource details the process of setting up a Java IDE like Netbeans to debug extensions directly within Burp Suite, implementing the `IBurpExtender` and `IScannerCheck` interfaces, and constructing `IScanIssue` objects to report findings. The example extension checks for the presence of specific response headers during passive scans. | Burp |
| 2020-05-30 2020 | BurpSuite Extensions: Some Favorites - VDA Labs Library of Burp Suite extensions featuring Taborator for out-of-band interactions, JSON Beautifier and .NET Beautifier for improved readability, Active Scan++ for enhanced issue detection including Shellshock, and Freddy for deserialization vulnerabilities. Additional tools like HTML5 Auditor, CSP-Bypass, AWS Security Checks, Retire.js for outdated JavaScript, SSL Scanner for TLS issues, J2EEScan with CVE-2010-1871 and CVE-2011-2730, Error Message Checks, Software Vulnerability Scanner via Vulners.com API, CSRF Scanner, Collaborator Everywhere for backend systems, and Upload Scanner for file upload bypasses are also detailed. | Burp |
| 2020-02-25 2020 | doyensec/graph-ql: GraphQL Security Research Material Tool for GraphQL security testing, InQL offers a Scanner to auto-generate queries and mutations, a Points of Interest analysis for vulnerability detection, and circular reference detection. It seamlessly integrates with Burp for enhanced interactions, supports custom headers, and allows batch GraphQL attacks. InQL also includes an engine fingerprinting scanner to retrieve backend server technology information and can recreate schemas even when introspection is disabled. | GraphQL |
| 2019-11-14 2019 | PortSwigger Launches Web Security Academy Academy launched by PortSwigger, offering free interactive labs and reading materials to address global cybersecurity talent shortages. The platform features content on clickjacking, WebSocket, HTTP request smuggling, server-side request forgery, and XXE injection, allowing users to practice in a safe, risk-free environment and track their progress. The content will be continually updated to reflect evolving cyber threats. | Burp |
| 2019-08-23 2019 | How i exploit out-of-band resource load (HTTP) using burp suite extension plugin (taborator) The content discusses exploiting out-of-band resource load using a Burp Suite extension plugin called Taborator. It focuses on the background of the issue, likely related to leveraging HTTP requests to manipulate or extract data from a target system. The use of Burp Suite, a popular web vulnerability scanner, in combination with the Taborator plugin suggests a method for identifying and potentially exploiting vulnerabilities related to out-of-band resource loading. This technique could be used for security testing and identifying weaknesses in web applications. | Burp |
| 2019-03-10 2019 | The Top 5 Burp Suite Extensions Extensions for Burp Suite enhance its capabilities for security researchers. XSS Validator aids in confirming cross-site scripting vulnerabilities by using PhantomJS to verify findings. Burp Notes improves documentation by allowing detailed saving of target and attack information. Sentinel offers a free alternative to Burp Pro's scanner. Random IP Address Header helps evade WAFs by periodically altering the IP address. Bupy and Python Scripter enable custom script development for advanced Burp manipulation. | Burp |
| 2018-11-08 2018 | AES-Killer v3.0 - Burp Plugin To Decrypt AES Encrypted Traffic Of Mobile Apps On The Fly AES-Killer v3.0 is a Burp plugin designed to decrypt AES encrypted traffic from mobile apps in real-time. This tool allows for the decryption of encrypted data on the fly, aiding in the analysis of mobile app traffic for security testing and debugging purposes. | Burp |
| 2018-06-08 2018 | SleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Po SleuthQL is a tool designed to parse Burp history and identify potential SQL injection points. It aims to assist in discovering vulnerabilities related to SQL injection by analyzing requests and responses within Burp Suite. This tool is useful for security professionals and researchers looking to enhance their testing capabilities and identify potential weaknesses in web applications. | Burp |
| 2017-03-07 2017 | PortSwigger Web Security Blog: Adapting AngularJS Payloads to Exploit Real Writeup detailing techniques for adapting AngularJS template injection payloads to bypass filtering and encoding, specifically targeting Piwik and Uber. The article demonstrates exploiting Piwik's handling of referral queries and Uber's documentation site, showcasing payload adaptations using Unicode escapes, `concat` instead of `valueOf`, string manipulation via `toString` and array joins, and exploiting JavaScript sandbox limitations. It highlights successful exploitation against AngularJS versions 1.2.26 and 1.2.0, noting rapid patching by Uber. | XSS |
| 2017-03-07 2017 | PortSwigger Web Security Blog: XSS without HTML: Client-Side Template Injec Library for detecting and exploiting Angular Template Injection vulnerabilities in AngularJS applications. It details how naive usage of the popular JavaScript framework can lead to Cross-Site Scripting (XSS) by enabling the execution of Angular expressions. The library covers the development of a sandbox escape technique, specifically for Angular versions 1.3.1+ and 1.4.0+, by backdooring the `String.fromCharCode` function using `Array.prototype.join` to inject arbitrary JavaScript, including a demonstration of bypassing the Angular sanitizer. | XSS |
| 2016-12-28 2016 | The Top 8 Burp Suite Extensions - Think outside the box The content is a title mentioning the top 8 Burp Suite extensions and encourages thinking outside the box when using these tools. It suggests that these extensions can enhance the functionality of Burp Suite, a popular web application security testing tool. The focus is on exploring innovative ways to utilize these extensions to improve security testing processes. | Burp |
sqlmap sqlmap.org #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-28 2026 | LiteLLM Contains Critical SQL Injection Vulnerability LiteLLM, a library simplifying API calls to LLMs, has a critical SQL injection vulnerability. This flaw allows attackers to execute arbitrary SQL queries, potentially leading to data breaches, unauthorized access, or system compromise. The vulnerability arises from improper sanitization of user-supplied input within the library's database interaction logic. Users are strongly advised to update LiteLLM to the latest version to patch this critical security flaw and protect their systems. No specific bounty payout amount was mentioned. | API Sec |
| 2026-04-22 2026 | SQLMap Tamper Collection: Modern WAF Bypass Scripts (Cloudflare, AWS, Azure) Library for context-aware SQL transformation and WAF bypass, supporting Cloudflare, AWS, and Azure. It features a full SQL lexer with UUID tracking, multi-character operator support, and deterministic output preserving SQL validity. Transformations include keyword wrapping, space replacement, value encoding, and case alternation, with advanced options like homoglyphs and numeric obfuscation. The framework maintains SQL structure, handles nested subqueries, and offers reapplication protection, designed primarily for MySQL syntax. | SQLi |
| 2026-04-22 2026 | Pentesting PostgreSQL with SQL Injections Library for analyzing and exploiting SQL injection vulnerabilities specifically targeting PostgreSQL. It details bypass methods for web application firewalls, techniques for data exfiltration across various query clauses including SELECT, WHERE, FROM, and ORDER BY, and demonstrates how to exploit nested queries. The resource covers bypassing spaces, trailing data, quotation marks using dollar quoting or `CHR()` function, and utilizes time-based blind SQL injection with concatenation and conditional logic for data leakage. | SQLi |
| 2026-04-22 2026 | CVE-2025-52694 PoC: Critical SQL Injection in Advantech IoTSuite/SaaS-Composer Toolchain for CVE-2025-52694, a critical unauthenticated SQL Injection vulnerability impacting Advantech IoTSuite/SaaS-Composer products prior to specific versions. The PoC offers a standalone Python script for time-based SQL injection tests and a nuclei template utilizing a clusterbomb attack to discover vulnerable `org_id` values. Exploitation allows for database dumping, data modification, and potential RCE by unsafely concatenating the `filename` parameter into PostgreSQL queries. | SQLi |
| 2026-04-22 2026 | MCP Vulnerability Case Study: SQL Injection in the Postgres MCP Server Writeup on a SQL injection vulnerability in Anthropic's reference Postgres MCP server, allowing arbitrary SQL execution by terminating the read-only transaction with a `COMMIT;` statement. Though deprecated, the `@modelcontextprotocol/server-postgres` NPM package and `mcp/postgres` Docker image see significant weekly downloads. The vulnerability is patched in the Zed Industries fork (`@zeddotdev/postgres-context-server` v0.1.4) and an unreleased reference implementation. Users should avoid the deprecated server for sensitive data and consider the Zed Industries fork for mitigation. | SQLi |
| 2026-04-22 2026 | BWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL Injections BWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL Injections | SQLi |
| 2026-04-17 2026 | Discovering GraphQL endpoints and SQLi vulnerabilities Discovering GraphQL endpoints and SQLi vulnerabilities | GraphQL |
| 2026-04-17 2026 | HackerOne Report #435066: SQL injection in GraphQL endpoint HackerOne Report #435066: SQL injection in GraphQL endpoint | GraphQL |
| 2026-04-16 2026 | SQLMap Cheat Sheet: Commands, Options, and Advanced Features Cheatsheet detailing sqlmap commands, options, and advanced features for automating SQL injection detection and exploitation. It covers system requirements, installation, various SQLi attack techniques including in-band (error-based, union-based, stacked queries, inline queries), out-of-band, inferential (boolean, time-based), and compound attacks, alongside essential options for reconnaissance, enumeration, and vulnerability scanning. | SQLi |
| 2026-04-15 2026 | SAP Security Patch Day April 2026: Critical Vulnerabilities CVSS 9.9 SQL Injection and Authorization Risks Analysis of SAP Security Patch Day April 2026 highlights critical vulnerabilities, including a CVSS 9.9 SQL injection in SAP Business Planning and Consolidation and SAP Business Warehouse, allowing authenticated users to execute arbitrary SQL. A high-severity authorization flaw in SAP ERP and SAP S/4HANA, with a CVSS of 7.1, permits authenticated users to overwrite existing executable reports. Medium-priority issues affect SAP BusinessObjects BI Platform with denial-of-service and SAP Human Capital Management for SAP S/4HANA with information disclosure. Practitioners like SecurityBridge, Pathlock, and Layer Seven Security detail exploitation paths, internal authorization risks, and cross-layer exposure across SAP environments. | SQLi |
| 2026-04-15 2026 | FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion https://ift.tt/ENselVr | SQLi |
| 2026-04-14 2026 | CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks https://ift.tt/HrQnkXP | SQLi |
| 2026-04-14 2026 | SAP Patch Day Fixes Critical SQL Injection DoS and Code Injection Flaws SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws https://ift.tt/wOQTGjW | SQLi |
| 2026-04-14 2026 | SAP Patch Day Fixes Critical SQL Injection DoS and Code Injection Flaws SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws https://ift.tt/lgQwt4L | SQLi |
| 2026-04-14 2026 | CISA Warns of Fortinet SQL Injection Flaw Actively Exploited in Attacks CISA Warns of Fortinet SQL Injection Flaw Actively Exploited in Attacks https://ift.tt/kN2acMA | SQLi |
| 2026-04-14 2026 | CISA Warns Fortinet SQL Injection Flaw Is Being Actively Exploited CISA Warns Fortinet SQL Injection Flaw Is Being Actively Exploited https://ift.tt/3sSd5jK | SQLi |
| 2026-04-14 2026 | SAP Patch Day Fixes Critical SQL Injection DoS and Code Injection Flaws SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws https://ift.tt/QS2AJx7 | SQLi |
| 2026-04-11 2026 | 400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw Library vulnerability in Elementor's Ally plugin, tracked as CVE-2026-2413, exposes over 400,000 WordPress sites to SQL injection attacks. Exploitable without authentication when the Remediation module is active, the flaw allows attackers to steal sensitive data like password hashes by manipulating database queries through crafted URL parameters. Elementor has released a patch, and users are advised to update the plugin, disable unused features, deploy a WAF, and enforce least privilege for database accounts. | SQLi |
| 2026-04-11 2026 | SQL injection vulnerabilities in Owncloud Android app Advisories detail SQL injection vulnerabilities in the Owncloud Android app, specifically impacting the `FileContentProvider` (GHSL-2022-059) and the `ReceiveExternalFilesActivity`. The `FileContentProvider` allows malicious applications to exploit SQL injection flaws through its `delete`, `insert`, `query`, and `update` methods, potentially leading to unauthorized data access or modification within the app's databases. Additionally, improper sanitization of externally provided file paths in `ReceiveExternalFilesActivity` can allow attackers to read from or write to the application's internal storage. | Mobile |
| 2026-04-10 2026 | SQL Injection in 2026: It Took One Apostrophe SQL Injection in 2026: It Took One Apostrophe | SQLi |
| 2026-04-10 2026 | Advanced SQL Injection Techniques in Modern Web Apps Writeup detailing advanced SQL injection techniques like second-order, time-based blind, and WAF bypasses through encoding and case variation. It emphasizes prevention strategies such as parameterized queries, strict input validation, and least privilege for database users, and mentions tools like SQLi Detector for automated testing, highlighting real-world applications in e-commerce platforms, CMS systems, and API endpoints. | SQLi |
| 2026-04-10 2026 | Bypassing WAF with Adversarial SQL Bypassing WAF with Adversarial SQL | SQLi |
| 2026-04-10 2026 | WAF Bypass Using JSON-Based SQL Injection Attacks Library entry detailing a WAF bypass technique using JSON-based SQL injection, building on research that found major vendors like Palo Alto Network, AWS, Cloudflare, F5, and Imperva failed to properly inspect JSON payloads. This method exploits the compatibility of databases such as PostgreSQL and MySQL with JSON, allowing malicious SQL commands to evade detection by many Web Application Firewalls. | SQLi |
| 2026-04-10 2026 | SQL Injection Security Vulnerabilities SQL Injection Security Vulnerabilities | SQLi |
| 2026-04-10 2026 | CVE Search: SQL Injection CVE Search: SQL Injection | SQLi |
| 2026-04-10 2026 | SQL Injection - OWASP Reference on SQL Injection attacks, detailing how attackers insert malicious SQL queries into application inputs to access, modify, or delete sensitive database data. It covers common attack vectors, the high severity risk associated with these vulnerabilities, and provides examples of exploitation in PHP, ASP, J2EE, and ASP.NET applications. The OWASP resource also points to prevention strategies like parameterized SQL statements and code review guides. | SQLi |
| 2026-04-10 2026 | CVE-2026-26116: SQL Server SQL Injection Writeup of CVE-2026-26116, a SQL Injection vulnerability affecting Microsoft SQL Server. Exploiting CWE-89, an authenticated attacker can elevate privileges over a network by manipulating SQL commands. Attackers with low-privilege accounts can craft malicious SQL statements to bypass authorization, access sensitive data, or gain administrative control. Mitigation involves applying Microsoft security updates, implementing parameterized queries, restricting network access, and enabling comprehensive auditing. | SQLi |
| 2026-04-09 2026 | Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks Library that allows manipulation of Claude Code via CLAUDE.md files to automate SQL injection attacks and steal credentials. Researchers at LayerX discovered that by adding three lines of basic English to the CLAUDE.md file, Claude Code's safety guardrails can be bypassed, leading it to execute unauthorized commands and perform actions such as login bypass and database dumping using techniques like SQL injection. The AI trusts the instructions within the CLAUDE.md file implicitly, creating a significant attack surface. | AI |
| 2026-04-09 2026 | Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation Attacks Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation Attacks https://ift.tt/7D4rhpX | SQLi |
| 2026-04-09 2026 | Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation https://ift.tt/fMHBmC1 | SQLi |
| 2026-04-09 2026 | Multiple SonicWall Flaws Enable SQL Injection and Privilege Escalation Attacks Multiple SonicWall Flaws Enable SQL Injection and Privilege Escalation Attacks https://ift.tt/IWwTAuM | SQLi |
| 2026-04-06 2026 | Bug Bounty Bootcamp #29: Boolean Blind SQL Injection Part 2 Bug Bounty Bootcamp #29: Boolean Blind SQL Injection Part 2 | SQLi |
| 2025-08-14 2025 | https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/ The content discusses website penetration testing and database hacking using SQLmap. It covers the importance of penetration testing to identify vulnerabilities, the process of using SQLmap for database hacking, and steps to perform SQL injection attacks. The article emphasizes the ethical use of these techniques for security testing and highlights the risks associated with unauthorized hacking. It provides insights into the tools and methods used in penetration testing and database hacking, aiming to enhance cybersecurity awareness and skills. | Bug Bounty |
| 2025-08-14 2025 | https://vavkamil.cz/2019/10/09/understanding-the-full-potential-of-sqlmap-during-bug-bounty-hunting/ The content discusses maximizing the potential of SQLmap during bug bounty hunting. It covers the importance of understanding SQL injection vulnerabilities, using SQLmap effectively, and customizing its options for better results. The article emphasizes the significance of proper reconnaissance, parameter identification, and evasion techniques to enhance the success rate of SQL injection attacks. It also provides insights into exploiting blind SQL injection vulnerabilities and leveraging SQLmap's advanced features to automate the detection and exploitation process. Overall, the content aims to help bug bounty hunters utilize SQLmap efficiently for discovering and exploiting SQL injection vulnerabilities. | Bug BountySQLi |
| 2024-11-13 2024 | SQLMap Command Generator SQLMap Command Generator | SQLi |
| 2023-09-22 2023 | How to turn SQL injection into an RCE or a file read? Case study of 128 bug bounty reports How to turn SQL injection into an RCE or a file read? Case study of 128 bug bounty reports https://www.youtube.com/watch?v=ClnVdYf4PK0 | RCETalks |
| 2023-06-08 2023 | Test website for SQL injection vulnerabilities using Python Test website for SQL injection vulnerabilities using Python https://ift.tt/msKlYeM | Python |
| 2022-04-09 2022 | Favorite tweet by @Jhaddix Favorite tweet:
4/8/22 #bugbountydiary #bugbountytips Everyone is sick in the house but I had some running scans I needed to check up on. I found a SQL injection bug on a blog. Here's how I did it, s... | Bug Bounty |
| 2022-01-16 2022 | How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes | FuzzingSQLi |
| 2021-04-16 2021 | DVWA 1.9+: Blind SQL Injection with SQLMap The content discusses performing Blind SQL Injection on DVWA 1.9+ using SQLMap. It follows a previous article on manual SQL Injection with OWASP ZAP. The focus is on hacking DVWA through Blind SQL Injection techniques. | SQLi |
| 2021-01-23 2021 | https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/ The content discusses website penetration testing and database hacking using a tool called SQLMap. It covers the process of identifying vulnerabilities in websites, exploiting them to gain unauthorized access to databases, and extracting sensitive information. The article provides a step-by-step guide on how to perform these tasks using SQLMap, a popular tool for automated SQL injection and database takeover. It emphasizes the importance of ethical hacking practices and the need for organizations to secure their websites and databases against potential cyber threats. | SQLi |
| 2020-04-17 2020 | SQL Injection Cheat Sheet by Netsparker Library: Invicti SQL Injection Cheat Sheet, this resource offers detailed technical information and attack payloads for testing various SQL injection vulnerabilities across MySQL, Microsoft SQL Server, Oracle, PostgreSQL, and SQLite. It covers techniques such as UNION attacks, stacked queries, boolean-based blind SQL injection using IF and CASE statements, and bypassing filters with hex encoding and string concatenation. The cheat sheet also highlights the utility of DAST tools like Invicti and Acunetix for automating SQLi detection. | SQLi |
| 2019-12-29 2019 | https://medium.com/bugbountywriteup/sql-injection-time-and-boolean-based-27239b6a55e8?source=twitterShare-1764222123d3-1576594710&_referrer=twitter&_branch_match_id=732557985002302401 The content discusses SQL injection vulnerabilities, specifically focusing on time-based and boolean-based techniques. It explains how attackers can exploit these vulnerabilities to manipulate database queries and gain unauthorized access to sensitive information. The article likely provides examples, explanations, and possibly mitigation strategies for preventing SQL injection attacks. | SQLi |
| 2019-11-17 2019 | Understanding the full potential of sqlmap during bug bounty hunting The content discusses utilizing sqlmap, a tool for detecting and exploiting SQL injection vulnerabilities, in bug bounty hunting and ethical hacking for offensive website security. It emphasizes understanding the full potential of sqlmap to effectively identify and exploit vulnerabilities. The focus is on leveraging this tool to enhance security testing efforts and maximize the outcomes of bug bounty programs. | Bug BountySQLi |
| 2019-10-05 2019 | SQL injection to RCE The content discusses a case of SQL injection leading to Remote Code Execution (RCE) discovered during a recent customer penetration testing exercise. The author will detail the scenario in the following lines. | RCESQLi |
| 2018-07-29 2018 | Making a Blind SQL Injection a Little Less Blind The content discusses the author's experience finding a SQL Injection bug despite the belief that manual SQL Injections are no longer common. The author aims to shed light on this issue and shares insights on how to make a Blind SQL Injection less challenging. | SQLi |
| 2018-07-19 2018 | Comprehensive Guide to Sqlmap (Target Options) The article discusses the "target commands" in sqlmap, a tool for SQL injection attacks. These commands are used to specify the target website or application for the attack. Understanding and utilizing these commands effectively is crucial for successful SQL injection testing. | SQLi |
| 2018-01-11 2018 | SQL Injection Wiki Library: SQL Injection Wiki, a comprehensive resource for identifying, exploiting, and escalating SQL injection vulnerabilities across various Database Management Systems. This wiki follows a typical escalation path, assuming basic SQL injection knowledge, and includes version-specific query information. Contributions are welcomed via GitHub. | SQLi |
nuclei github.com/projectdiscovery #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-17 2026 | Recon-Script: automation with Nuclei (s1d6point7bugcrowd) Library for automating Nuclei vulnerability scans, integrating features like voice notifications via espeak, proxychains support, and optional cloud uploads to ProjectDiscovery Cloud Platform (PDCP). It allows for out-of-scope filtering, custom bug bounty headers, and detailed scan logging with timestamps, supporting tools such as subfinder, dnsx, and httpx. | Recon |
| 2026-04-17 2026 | The Ultimate Guide to Finding Bugs With Nuclei (ProjectDiscovery) Library for efficient, extensible vulnerability scanning using YAML-based templates. Nuclei supports HTTP, DNS, SSL, and raw TCP protocols, allowing detection of CVEs, misconfigurations, and sensitive file exposures. It integrates into workflows with other tools and offers features like custom template creation, fuzzing, advanced DSL for matchers, and various scan modes including headless and network. Advanced options include rate limiting, template filtering by technology, severity, or name, and resuming interrupted scans. | Recon |
| 2026-04-17 2026 | Automate Your Nuclei Recon Pipeline with VPN + Discord Alerts Script automates bug bounty reconnaissance by enumerating subdomains with subfinder, probing live hosts via httpx, rotating NordVPN IPs, and running Nuclei scans with specific templates and filters. It sends Discord alerts for any found vulnerabilities, detailing the count, severity, template ID, matched target, and current IP. The process is designed for repeatable, single-command execution on a list of target domains. | Recon |
| 2026-04-16 2026 | From Recon to Sensitive Key Exposure Using Nuclei From Recon to Sensitive Key Exposure Using Nuclei | Recon |
| 2026-04-16 2026 | Automating Bug Bounties with Nuclei Automating Bug Bounties with Nuclei | Bug Bounty |
| 2026-04-16 2026 | Advanced Techniques & Use Cases of Nuclei for Bug Bounty Advanced Techniques & Use Cases of Nuclei for Bug Bounty | Bug Bounty |
| 2025-08-14 2025 | NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open NucleiFuzzer is an automation tool designed to detect vulnerabilities like XSS, SQLi, SSRF, and Open. It is powerful and efficient in identifying these security issues. | FuzzingSQLiSSRFXSS |
| 2025-08-14 2025 | NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open "NucleiFuzzer is an automation tool designed to detect vulnerabilities like XSS, SQLi, SSRF, and Open. It offers powerful capabilities for automated security testing." | SSRF |
| 2025-05-22 2025 | New CVE : CVE-2025-4123 Grafana open redirect XSS/SSRF via path traversal Detect it now with Nuclei template #infosec #cve #nuclei #grafana #ssrf #xss #openredirect A new CVE, CVE-2025-4123, highlights a vulnerability in Grafana that allows open redirect, XSS, and SSRF via path traversal. The issue can be detected using Nuclei template. The post emphasizes the importance of addressing this security concern in Grafana. #infosec #cve #nuclei #grafana #ssrf #xss #openredirect. | SSRF |
| 2024-09-26 2024 | Simplifying XSS Detection with Nuclei - A New Approach Library for simplifying XSS detection, leveraging Nuclei's headless mode and the `waitdialog` action. This technique mimics real user interactions by running JavaScript, allowing for detection of XSS payload execution via JavaScript dialogs rather than relying on complex, target-specific reflection-based string matchers. The headless approach offers higher accuracy and reduced complexity, making XSS detection more consistent across different web applications. | XSS |
| 2024-09-18 2024 | Cybersleuth254: Found an SSRF vulnerability using a custom Nuclei template! This bug allows attackers to inject malicious URLs and access sensitive data on the server. #Cybersecurity #SSRF #BugBounty #PenTesting #Infosec #Nuclei Cybersleuth254 discovered an SSRF vulnerability using a custom Nuclei template, enabling attackers to inject malicious URLs and access sensitive server data. The finding highlights the importance of cybersecurity measures like bug bounties, penetration testing, and information security. #Cybersecurity #SSRF #BugBounty #PenTesting #Infosec #Nuclei. | SSRF |
| 2024-09-18 2024 | Cybersleuth254: Found an SSRF vulnerability using a custom Nuclei template! This bug allows attackers to inject malicious URLs and access sensitive data on the server. Always validate inputs to prevent these threats! #Cybersecurity #SSRF #BugBounty #PenTesting #Infosec #Nuclei Cybersleuth254 discovered an SSRF vulnerability using a custom Nuclei template, enabling attackers to inject malicious URLs and access sensitive server data. The importance of input validation to prevent such threats is emphasized. The post highlights cybersecurity, SSRF, bug bounty, penetration testing, and Nuclei. | SSRF |
| 2023-08-11 2023 | The Ultimate Guide to Finding Bugs With Nuclei Library for efficient, extensible vulnerability scanning using YAML-based templates. Nuclei supports HTTP, DNS, SSL, and raw TCP protocols, allowing users to define custom checks for vulnerabilities. It can scan thousands of hosts rapidly, integrates into existing workflows, and offers template filtering by technology, severity, or CVE. Advanced features include custom template creation, fuzzing, multi-step interactions, and support for network, DNS, file, and headless modes. | Bug Bounty |
| 2022-03-02 2022 | Favorite tweet by @ptracesecurity Favorite tweet:
Nuclei-Burp Extension: run nuclei scanner directly from burp https://t.co/5eXxgjapf7 #Pentesting #BurpSuite #WebSecurity #Infosec https://t.co/xwhsoQfhRo
— Ptrace Security GmbH (@ptr... | Recon |
| 2022-01-10 2022 | Nuclei Templates Library of community-curated templates for the nuclei scanner, designed to detect various application security vulnerabilities. This repository houses templates developed by the project team and contributions from the security community, covering diverse attack vectors. Detailed documentation for creating custom templates is available, alongside statistics on template attributes like tags, author, severity, and type. Community engagement is encouraged through GitHub discussions and a Discord server for direct interaction with maintainers. | FuzzingRecon |
| 2022-01-10 2022 | Install Nuclei Library for fast, template-based vulnerability scanning using simple YAML templates. It supports multiple protocols like HTTP, DNS, and TCP, and can be integrated into CI/CD pipelines. Nuclei allows for custom vulnerability detection scenarios to reduce false positives and includes integrations with tools like Jira, Splunk, and GitHub. The tool requires Go version 1.24.2 or later for installation. | FuzzingRecon |
| 2021-11-24 2021 | Install Nuclei Tool for high-performance vulnerability scanning, Nuclei uses simple YAML templates for custom detection scenarios, minimizing false positives through real-world simulation. It supports numerous protocols including HTTP, DNS, and TCP, integrates with CI/CD pipelines, and offers extensive filtering and output options. Installation requires Go version 1.24.2 or later. | Bug BountyRecon |
| 2021-06-11 2021 | Mobile Nuclei Templates Library of Nuclei templates designed for mobile security assessments. It includes specific templates for Android applications, focusing on `smali` checks. A dedicated `Keys` folder provides templates to identify API keys using regex patterns on decompiled Android apps, local code repositories, or unzipped IPA files. Users should install Nuclei from its GitHub repository to utilize these templates effectively for targeted mobile app analysis. | Mobile |
OWASP ZAP zaproxy.org #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-11 2026 | OWASP Top 10 for LLMs 2025: Key Risks and Mitigation Strategies Survey of the OWASP Top 10 for LLM Applications (2025), detailing evolving technical and socio-technical risks like prompt injection and excessive agency. This updated list guides enterprises in securing generative AI ecosystems, from training pipelines to plugins, addressing data disclosure and systemic vulnerabilities relevant to GDPR, HIPAA, CCPA, and the EU AI Act. Invicti's proof-based scanning and LLM-specific checks are presented as tools to validate real risks and strengthen defenses. | AI |
| 2026-04-10 2026 | OWASP WSTG: Testing JSON Web Tokens Reference detailing OWASP's Web Security Testing Guide (WSTG) procedures for testing JSON Web Tokens (JWTs). It covers analyzing JWT headers and payloads for sensitive data, testing for tampering vulnerabilities, and verifying signature integrity. Specific attack vectors discussed include exploiting the "none" algorithm, the ECDSA "psychic signatures" vulnerability (CVE-2022-21449), weak HMAC key cracking using tools like crackjwt.py and John the Ripper, and HMAC vs. public key confusion attacks. | JWT |
| 2026-04-10 2026 | BLA9:2025 Broken Access Control - OWASP Reference detailing BLA9:2025 Broken Access Control, a critical OWASP Top 10 vulnerability. It explains how missing role checks, flawed logic trusting client-supplied parameters, overly broad permissions, and identifier tampering (BOLA) enable attackers to perform unauthorized operations. Examples include Gitlab branch deletion vulnerabilities and privilege escalation in hay-kot mealie v2.2.0, mapping to CWEs like CWE-863 and CWE-862, and referencing CVEs such as CVE-2021-39931 and CVE-2023-3290. | AuthZ |
| 2026-04-10 2026 | OWASP A01: Broken Access Control Risks and Prevention Library detailing OWASP A01: Broken Access Control risks and prevention. This resource clarifies the distinction between authentication and authorization, highlights the importance of the principle of least privilege (PoLP) and Role-Based Access Control (RBAC), and provides a Python Flask code snippet demonstrating secure RBAC implementation. It further explains how vulnerabilities manifest through techniques like URL manipulation and parameter tampering, and identifies common failure scenarios such as Insecure Direct Object References (IDOR) and missing function-level access control. | AuthZ |
| 2026-04-10 2026 | OWASP-TOP-10 A01:2025 Broken Access Control Library detailing Broken Access Control, a critical OWASP Top 10 risk where applications fail to enforce user restrictions. This resource highlights how attackers can exploit missing or client-side enforced authorization checks, using tools like Burp Suite to directly access backend administrative endpoints. It demonstrates the vulnerability through a case study of an application trusting client-side role validation, leading to unauthorized data access, privilege escalation, and account compromise, and emphasizes implementing server-side authorization and the principle of least privilege for mitigation. | AuthZ |
| 2026-04-10 2026 | IDOR - OWASP Foundation Reference detailing Insecure Direct Object Reference (IDOR) vulnerabilities, a class of Broken Access Control (OWASP Top 10 A01:2025). IDOR occurs when applications expose internal object references, like database keys or file names, without verifying user authorization, allowing attackers to access unauthorized resources by modifying these references in URL path parameters, query strings, or request bodies. Prevention strategies include enforcing server-side authorization, using non-sequential identifiers, applying the principle of least privilege, and validating access at the data layer. | IDOR |
| 2026-04-03 2026 | Insecure Deserialization | OWASP Reference on Insecure Deserialization, a vulnerability that allows attackers to execute code or manipulate objects by abusing an application's deserialization process with untrusted data. This vulnerability can lead to remote code execution, denial-of-service, and privilege escalation. Mitigations include avoiding deserialization of untrusted data, implementing integrity checks, enforcing strict type constraints, isolating deserialization code, logging exceptions, monitoring the process, and using alternative formats like JSON. | Deser |
| 2026-01-09 2026 | OWASP CRS Vulnerability Enables Charset Validation Bypass The content discusses a vulnerability in the OWASP CRS (Core Rule Set) that allows attackers to bypass charset validation. This vulnerability could potentially be exploited by malicious actors to evade security measures and launch attacks. It highlights the importance of addressing and patching vulnerabilities promptly to enhance cybersecurity defenses and protect systems from potential threats. | XSS |
| 2026-01-09 2026 | OWASP CRS Vulnerability Allows Attackers to Bypass Charset Validation The OWASP CRS vulnerability enables attackers to bypass charset validation, as reported on cyberpress.org. This vulnerability poses a security risk by allowing malicious actors to circumvent charset validation measures. Organizations using OWASP CRS should be aware of this issue and take necessary steps to mitigate the vulnerability to prevent potential attacks. | XSS |
| 2025-08-14 2025 | OWASP Videos The content is concise and simply states "OWASP Videos," indicating that there are videos related to the Open Web Application Security Project (OWASP). OWASP is a non-profit organization focused on improving software security. The videos likely cover various topics related to web application security, such as best practices, vulnerabilities, and tools. Viewers can expect educational content on how to secure web applications and prevent security breaches. | Talks |
| 2025-08-14 2025 | XSS (Cross Site Scripting) Prevention Cheat Sheet - OWASP Reference detailing XSS prevention techniques, emphasizing the necessity of combining defensive measures. It highlights how modern frameworks like React and Angular mitigate XSS through templating and auto-escaping, yet points out potential vulnerabilities when these frameworks are used insecurely, such as with React's `dangerouslySetInnerHTML` or Angular's `bypassSecurityTrustAs*` functions. The guide stresses the importance of output encoding, including HTML entity, attribute, JavaScript, CSS, and URL encoding, with specific advice on safe sinks like `.textContent` and `.setAttribute`. | XSS |
| 2024-09-23 2024 | Sec_Mind_Maps/OWASP API TOP 10.pdf at main · h0tak88r/Sec_Mind_Maps cyber security mind maps collection. Contribute to h0tak88r/Sec_Mind_Maps development by creating an account on GitHub. | API Sec |
| 2024-07-22 2024 | DOM Based XSS | OWASP Foundation Reference detailing DOM-based XSS (Type-0 XSS), a vulnerability where client-side scripts execute unexpectedly due to malicious modifications of the DOM environment, not the HTTP response itself. It provides examples, including a `decodeURIComponent` vulnerability and the fragment-based technique to bypass server-side detection, and mentions attacks against Adobe PDF plugins. The entry also references testing tools like DOM Snitch and the DOM XSS Wiki. | XSS |
| 2022-02-27 2022 | Favorite tweet by @ZAProxyCon Favorite tweet:
You're invited to #ZAPCon 2022! ⚡️ Whether you are just getting started, or have a decade of experience with ZAP, ZAPCon will level-up your AppSec skills. 100% Virtual. 100% Free! 🎟️ ... | Bug BountyTalks |
| 2020-01-31 2020 | OWASP Videos The OWASP Foundation hosts videos on its website to educate about software security. OWASP is a nonprofit organization dedicated to enhancing software security. | Talks |
TruffleHog github.com/trufflesecurity #
| Date | Resource | Topics |
|---|---|---|
| 2026-05-08 2026 | How to mitigate secrets risk and prevent future breaches Library for detecting and managing secrets risk in code. It details how leaks of credentials, tokens, and signing keys in open source and proprietary repositories are a growing concern, with millions exposed on platforms like GitHub and npm. The library aids in situational awareness by identifying exposed secrets, understanding their purpose, and assessing their potential impact. It emphasizes investing in advanced tooling to filter false positives and prioritize active tokens, alongside evolving development practices to mitigate risks from the design stage forward, ultimately aiming to prevent future breaches. | Secrets |
| 2026-04-19 2026 | Shai-Hulud: A Persistent Secret Leaking Campaign — GitGuardian Analysis of the Shai-Hulud campaign details a persistent supply chain attack targeting NPM packages like @ctrl/tinycolor, using malicious GitHub Actions to exfiltrate secrets from local environments and repositories. Similar to the s1ngularity and GhostActions campaigns, this attack injects compromised workflows to steal credentials, including GitHub tokens, NPM tokens, and AWS Keys. GitGuardian's HasMySecretLeaked service allows developers to check for compromised secrets without exposing their values. | Supply Chain |
| 2026-04-17 2026 | TruffleHog: Deep Dive on Secret Management (Jit) Library for detecting hardcoded secrets in code. TruffleHog uses hundreds of patterns and strings to identify exposed credentials for services like AWS, GCP, and Azure, and integrates with tools like Slack and Stripe. It offers automation via pre-commit hooks and GitHub Actions, remote scanning capabilities, customizable rules, and secret verification by making API calls. The library also assists in remediating exposed secrets by providing guidance on rotating credentials and cleaning Git history using tools like BFG Repo-Cleaner. | Secrets |
| 2026-04-17 2026 | TruffleHog Open Source v3 vs GitGuardian Library comparing TruffleHog Open Source v3 and GitGuardian's code security platform for secrets detection. TruffleHog is a CLI tool for finding hardcoded secrets in repositories, while GitGuardian offers an integrated platform with automated detection, Honeytoken capabilities, alerting, incident prioritization, and remediation workflows across various version control systems. GitGuardian aims to reduce false positives through its detection engine and provides enhanced collaboration, enterprise-grade features, and dedicated support, contrasting with TruffleHog's open-source limitations in scalability and built-in functionality. | Secrets |
| 2026-04-17 2026 | git-secret-scanner: Find secrets with TruffleHog & Gitleaks Tool for finding secrets in Git organizations and groups, combining TruffleHog's classification strengths with Gitleaks' broader detection capabilities. It supports GitHub and GitLab, utilizes specific tokens with required scopes, and offers features for ignoring secrets via annotations or fingerprint files, as well as baseline scanning to detect new secrets. | Secrets |
| 2026-04-17 2026 | Gitleaks vs TruffleHog 2026 Benchmarks (AppSec Santa) Library for open-source secret scanning, comparing Gitleaks and TruffleHog. Gitleaks excels as a fast, pre-commit hook using regex for rapid detection within git repositories. TruffleHog offers deeper scanning across git, S3 buckets, Docker images, and Slack, featuring credential verification to confirm active leaks, making it suitable for CI/CD pipelines. Most teams utilize both tools for comprehensive secret protection. | Secrets |
| 2026-04-17 2026 | Rafter: detect-secrets vs gitleaks vs TruffleHog Library comparing `detect-secrets`, `git-secrets`, `gitleaks`, and `TruffleHog` for detecting leaked secrets. `git-secrets` is basic and AWS-focused. `detect-secrets` uses plugins and a baseline for brownfield repos, but has a higher false positive rate. `gitleaks` offers broad built-in coverage and fast scanning with 150+ rules. `TruffleHog` distinguishes itself by verifying found secrets via API calls, significantly reducing false positives by confirming active credentials. | Secrets |
| 2026-04-11 2026 | How TruffleHog Verifies Secrets Library detailing how TruffleHog verifies secrets, moving beyond simple entropy and regex checks. It explains the challenges in programmatically confirming API key validity by testing various endpoints like Doppler's `/v3/me`, handling diverse HTTP responses (including rate limits and error codes), and adapting to API changes and new key types. The library also covers complex verification for database credentials and emphasizes the community's role in maintaining TruffleHog's accuracy and low false-positive rates. | Secrets |
| 2026-04-10 2026 | Secret Scanner Comparison: Finding Your Best Tool Secret Scanner Comparison: Finding Your Best Tool | Secrets |
| 2026-04-10 2026 | 6 Effective Secret Scanning Tools Library for automated secret scanning that identifies and protects sensitive information like API keys and database credentials exposed in codebases, logs, or configuration files. It supports detection of various secret types, integrates with development workflows and CI/CD pipelines for early vulnerability detection, and provides actionable remediation insights. Specific tools mentioned include Legit Security, GitGuardian, AWS Secrets Manager, TruffleHog, Doppler, and GitLeaks. | Secrets |
| 2026-04-10 2026 | 8 Best Secret Scanning Tools (2026) Library for detecting hardcoded credentials, API keys, and tokens. It highlights tools like Gitleaks for pre-commit blocking, TruffleHog for live credential verification, and detect-secrets for legacy codebases. GitGuardian is noted as a leading managed platform, offering real-time monitoring and collaboration tool scanning. The library emphasizes the importance of early detection to prevent data breaches and account takeovers, contrasting the cost of pre-commit remediation with post-commit incident response. | Secrets |
| 2026-04-10 2026 | Best Secret Scanning Tools in 2025 Library for detecting hard-coded secrets in code, configurations, and cloud infrastructure. It utilizes pattern recognition, entropy checks, and AI to identify sensitive data like API keys and passwords, aiming to prevent data breaches by automating detection and remediation. Notable features include context-aware detection correlating secrets with other vulnerabilities, one-click remediation for many secret types, and integration into developer workflows via IDE extensions and pre-commit hooks. The library supports broad scanning across Git repositories, container images, and cloud environments, offering a free tier for basic use. | Secrets |
| 2026-04-03 2026 | TruffleHog - Find, Verify, and Analyze Leaked Credentials Tool for discovering, classifying, validating, and analyzing leaked credentials. TruffleHog scans Git, Jira, Slack, Confluence, Microsoft Teams, SharePoint, S3 buckets, GCS, and Docker images for over 800 secret types, including API keys and database passwords. It can verify if secrets are live and enrich findings by determining resource access and permissions. TruffleHog includes protections against malicious Git configurations, addressing CVE-2025-41390. | Secrets |
| 2022-03-17 2022 | Favorite tweet by @0x1shu Favorite tweet:
🧙♂️Git Secrets Leaks Simplified by @sec_r0 ✨ In this flyer, you'll learn about how git works and the reason behind the git secrets leaks. Download the flyer: https://t.co/zMruBpl6c4 ... | Bug Bounty |
| 2021-09-20 2021 | TruffleHog The Chrome Extension Tool for detecting API keys and other secrets like `.git` directories and `.env` files within JavaScript code and client-side applications. It leverages permissive CORS headers from services like AWS to identify instances where credentials might be inadvertently exposed, as demonstrated by an example on weather.com. The extension can be side-loaded while awaiting review on the Google Extension Store. | Secrets |
amass github.com/owasp-amass #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-17 2026 | Complete Guide to Amass Tool (2025 Edition) Library for comprehensive Amass recon and subdomain enumeration, covering installation on Kali Linux, Termux, and Windows WSL. It details Amass modules like Enum, Intel, Viz, Track, and DB, and provides basic usage examples for discovering subdomains, mapping DNS, and performing passive and active recon. The guide also includes pro tips for bug bounty hunters and installation via GitHub binary. | Recon |
| 2026-04-10 2026 | Amass Cheat Sheet: 70+ Commands for Recon & Bug Bounty Cheatsheet of 70+ Amass commands for reconnaissance and bug bounty hunting, detailing installation on Kali Linux, beginner and advanced techniques, and real penetration testing scenarios. This resource helps cybersecurity professionals discover subdomains, exposed infrastructure, and attack surfaces by leveraging open-source intelligence, DNS queries, and brute force methods. It also covers Amass's legal usage, its inclusion in Kali Linux, and alternatives like Subfinder and Sublist3r for comprehensive domain enumeration. | Recon |
| 2026-04-06 2026 | Using OWASP Amass with Netlas Module Library for reconnaissance and attack surface mapping, OWASP Amass integrates with the Netlas module. This guide details Amass installation via pre-built packages, source compilation, or Homebrew, and its configuration to leverage Netlas API keys within `datasources.yaml` for enhanced subdomain enumeration. Users can then execute `amass enum -d <domain> -include Netlas` to specifically query Netlas data or `amass enum -d <domain> -o <output_file>` to combine Netlas with other configured sources. | Recon |
| 2026-04-03 2026 | How to Use Amass for Subdomain Enumeration and Recon Like a Pro Library for comprehensive subdomain enumeration and attack surface discovery. Amass employs passive OSINT techniques, leveraging Certificate Transparency logs, Shodan, Censys, and public datasets, alongside active methods like DNS brute-forcing, permutations, and scraping. It supports DNS resolution and validation, brute-forcing with custom wordlists, reverse WHOIS and ASN lookups, and infrastructure mapping via graph databases, enabling visualization with `amass viz` and change detection with `amass track`. | Recon |
| 2025-08-14 2025 | amass — Automated Attack Surface Mapping | Daniel Miessler Tool for mapping attack surfaces, amass automates information gathering across multiple dimensions, integrating data from DNS enumeration, scraping various search engines, certificate transparency logs, and numerous APIs. It offers subcommands like `intel` for initial reconnaissance, `enum` for subdomain discovery and attack surface mapping, `viz` for visualizing results (including D3 and Maltego formats), `track` for historical analysis, and `db` for database management. Amass prioritizes diverse input sources and consistent developer attention, making it a robust solution for both offensive and defensive security operations. | Bug Bounty |
| 2021-10-28 2021 | Haklukes Guide to AmassHow to Use Amass More Effectively for Bug Bounties Haklukes Guide to AmassHow to Use Amass More Effectively for Bug Bounties | Bug BountyRecon |
| 2021-10-28 2021 | OWASP Amass - An Extensive Tutorial Library for passive and active reconnaissance, Amass facilitates subdomain discovery and external attack surface mapping using over 80 data sources. Its three subcommands, `intel`, `enum`, and `db`, support techniques like brute-forcing, DNS zone transfers, and certificate transparency log analysis, with findings stored in a graph database. | Recon |
| 2021-10-28 2021 | Amass/config.ini at master OWASP/Amass Amass/config.ini at master OWASP/Amass | Recon |
| 2021-10-28 2021 | OWASP Amass - Users' Guide Library for internet exposure investigation; this guide details OWASP Amass tool usage for subdomain enumeration via DNS and network mapping. It covers basic commands like `amass enum -d example.com` and advanced options including active enumeration (TLS certificates, zone transfers, web crawling) with `amass enum -active -d example.com`, passive data source utilization with `amass enum --passive -d example.com`, and Docker integration. The guide also explains configuration file management, API key storage, graph database persistence (file-based or PostgreSQL), and how findings from previous enumerations are leveraged. | Recon |
| 2021-10-28 2021 | OWASP/Amass Library for network asset discovery and attack surface mapping. This entry details installation instructions for Amass across various platforms including macOS (resolving "unidentified developer" warnings), Docker, Go compilation, Homebrew, FreeBSD, Kali Linux, NixOS, Gentoo, and Pentoo. It covers building Docker images, persisting graph databases, utilizing wordlists, and compiling from source with Go 1.18+. | Recon |
| 2021-10-28 2021 | How to Use OWASP Amass: An Extensive Tutorial Library for continuous subdomain discovery and external attack surface mapping, OWASP Amass offers multiple subcommands: `intel` for open-source intelligence gathering, `enum` for DNS enumeration and network mapping, `viz` for visualizing results, `track` for monitoring changes, and `db` for manipulating the graph database. It supports numerous data sources and techniques, including WHOIS, certificate transparency logs, DNS zone transfers, and brute-forcing, making it a comprehensive tool for penetration testers and security researchers. | Recon |
| 2019-11-12 2019 | amass — Automated Attack Surface Mapping | Daniel Miessler Tool for automated attack surface mapping, `amass` gathers information across multiple dimensions, leveraging various input sources like DNS enumeration, scraping from search engines (Baidu, Bing, Google), certificate transparency logs (Censys, Crtsh), APIs (Shodan, VirusTotal), and web archives. Its modules include `intel` for information gathering, `enum` for attack surface mapping, `viz` for visualization, `track` for historical data, and `db` for database manipulation. Examples showcase finding organizations via `-org` and discovering domains within CIDR ranges using `-cidr`. | Bug Bounty |
Frida frida.re #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | Reverse engineering and modifying Android apps with JADX and Frida Library for reverse engineering and modifying Android applications, utilizing JADX for code extraction and Frida for dynamic instrumentation. This resource details how to decompile APKs, analyze Java source code generated by JADX, and write custom Frida scripts to bypass security measures like certificate pinning, enabling traffic interception with tools like HTTP Toolkit. It covers techniques applicable to understanding and altering app behavior beyond standard certificate pinning implementations. | Mobile |
| 2026-04-22 2026 | Bypassing iOS Frida Detection with LLDB and Frida Writeup details bypassing iOS Frida detection using LLDB and Frida. The process involves jailbreaking an iPhone, setting up development tools like `libimobiledevice`, `frida-tools`, and LLDB, and then using `debugserver` for remote debugging. The author demonstrates how to find and breakpoint `FridaInTheMiddle.systemSanityCheck()` with LLDB to bypass detection, trace the `dummyFunction(flag:)` Swift function using `frida-trace` to get its mangled name, and finally hook this function with a Frida script to intercept and decode the Swift string argument, ultimately revealing the flag. | Mobile |
| 2026-04-22 2026 | frida-interception-and-unpinning: Scripts to MitM all HTTPS traffic Library of Frida scripts automates HTTPS MitM interception on mobile devices by redirecting traffic to a proxy, injecting CA certificates into trust stores, and patching certificate pinning and transparency checks. It also handles fallback patching for obfuscated certificate pinning on Android, disables root/jailbreak detection, and blocks HTTP/3 connections. The scripts can be used independently or together to intercept HTTP(S) traffic on Android and iOS. | Mobile |
| 2026-04-16 2026 | Frida's Impact on Mobile Security and How to Fight Back Frida's Impact on Mobile Security and How to Fight Back | Mobile |
| 2026-04-16 2026 | From an Android Hook to RCE: $5000 Bounty From an Android Hook to RCE: $5000 Bounty | Mobile |
| 2026-04-11 2026 | Frida CodeShare: iOS Jailbreak Detection Bypass Frida CodeShare: iOS Jailbreak Detection Bypass | Mobile |
| 2026-04-11 2026 | iOS Jailbreak Detection Bypass with Frida - Full Guide Library for bypassing iOS jailbreak detection using Frida. This guide details how to leverage Corellium's virtualized platform to identify and hook specific methods within applications like DVIA-2. It covers setup, class and method enumeration, and modifying boolean return values to circumvent detection mechanisms, enabling dynamic analysis and security testing of iOS applications. | Mobile |
| 2026-04-10 2026 | Frida - OWASP Mobile Application Security Tool Library for dynamic instrumentation, Frida enables JavaScript execution within native Android and iOS applications. It utilizes QuickJS for code injection via modes like Injected, Embedded, and Preloaded. Key APIs include Interceptor for inline hooking and Stalker for transparent, high-granularity tracing using JIT recompilation. Frida also offers specific APIs for Java and Objective-C interaction, alongside terminal tools such as `frida-ps` for process listing and `frida-trace` for function call tracing. Frida 17 introduces breaking changes, including the removal of bundled runtime bridges, necessitating separate installation via `frida-pm`, and API modifications for enhanced readability and performance. | Mobile |
| 2026-04-03 2026 | Bypassing Certificate Pinning Using Frida: A Step-by-Step Guide Walkthrough of bypassing certificate pinning on Android apps using Frida to enable Man-in-the-Middle (MitM) attacks. This guide details the setup of Frida, Android Studio, Mitmproxy, and an Android emulator, then demonstrates hooking into the ShipFast app's runtime to intercept HTTPS traffic, even when certificate pinning is implemented via the network security config file. | Mobile |
| 2026-04-03 2026 | Hail Frida!! The Universal SSL Pinning Bypass for Android Hail Frida!! The Universal SSL Pinning Bypass for Android | Mobile |
| 2026-04-03 2026 | Four Ways to Bypass Android SSL Verification and Certificate Pinning | NetSPI Library detailing four methods to bypass Android SSL verification and certificate pinning for man-in-the-middle attacks. Techniques include adding a custom CA to the trusted certificate store, overwriting packaged CA certificates, utilizing Frida to hook and bypass checks, and reversing custom certificate code, with tools like BurpSuite, ZAP, Frida, and Objection mentioned. | Mobile |
| 2026-04-03 2026 | Defeating Android Certificate Pinning with Frida Library for bypassing Android certificate pinning using Frida. This technique enables security researchers, developers, and privacy advocates to intercept and inspect HTTPS traffic from hyper-vigilant applications that employ custom certificate validation beyond the default system trust store. The library details how to leverage Frida scripts to modify application behavior dynamically, remove SSL pinning logic, and expose the actual network communication for analysis, particularly useful for apps like Twitter, N26, or BBVA. | Mobile |
nmap nmap.org #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-17 2026 | Mastering Network Scanning: Nmap and Masscan Guide Mastering Network Scanning: Nmap and Masscan Guide | Recon |
| 2026-04-14 2026 | Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities Snort rules detect exploitation attempts for Microsoft's April 2026 Patch Tuesday, which includes 165 vulnerabilities. Critical issues addressed by the rules include CVE-2026-23666 (.NET DoS), CVE-2026-33824 (Windows IKE RCE), CVE-2026-33826 (Active Directory RCE), and CVE-2026-33827 (Windows TCP/IP RCE). The update also covers several "more likely" to be exploited important vulnerabilities, such as CVE-2026-0390 (UEFI Secure Boot bypass) and CVE-2026-32201 (SharePoint spoofing). | RCE |
| 2026-02-16 2026 | How I Built a 5-Path AI “Recon Beast” with n8n and Gemini (2026 Guide) In 2026, the bug bounty landscape requires more than just speed, with AI enhancing attacker capabilities. The article discusses building a 5-Path AI "Recon Beast" using n8n and Gemini. This innovative approach leverages automation and AI to enhance reconnaissance processes for bug bounty hunting. The focus is on utilizing technology to improve efficiency and effectiveness in identifying vulnerabilities. | AI |
| 2025-04-11 2025 | Nmap for Beginners: Easy Tips to Scan Networks Like a Pro So, Think this :::: one night when you are trying to sleep , suddenly you imagine what’s happening on your network .. what devices are connected? What services are they running? {JUST 2 AM THOUGHTS… | Recon |
| 2025-03-22 2025 | A Deep Dive into Nmap Scripts for Web Application Testing | by Khaleel Khan | System Weakness A Step-by-Step Guide to Leveraging Nmap’s Most Advanced Scripts for Comprehensive Web Application Security Analysis This scenario showcases how an experienced penetration tester could leverage Nmap’s… | Recon |
| 2025-01-29 2025 | GitHub - Chleba/netscanner: Terminal Network scanner & diagnostic tool with modern TUI Tool for terminal-based network scanning and diagnostics featuring a modern TUI. It lists hardware interfaces, allows switching active interfaces for scanning and packet-dumping, scans WiFi networks and signal strength with charts, and performs IPv4 pinging of CIDRs with hostname, OUI, and MAC address resolution. The tool also supports IPv4 and IPv6 packet dumping (TCP, UDP, ICMP, ARP, ICMP6), pausing packet dumps, scanning open TCP ports, filtering packet logs, exporting scanned data to CSV, and traffic counting with DNS records. It relies on Ratatui and libpnet libraries. | Recon |
| 2025-01-28 2025 | GitHub - aceberg/WatchYourLAN: Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history Tool for lightweight network IP scanning, WatchYourLAN detects new hosts, monitors online/offline history, and logs all devices. It supports data export to InfluxDB2 or Prometheus for Grafana dashboards. While lacking built-in authentication, it can integrate with SSO tools like Authelia or ForAuth. Installation is available via Docker, with binary packages for various Linux distributions and architectures, and dependencies include `arp-scan` and `tzdata`. | Recon |
| 2023-06-02 2023 | The Ultimate Guide to Port Scanning using Nmap | Nmap Notes Library for port scanning with Nmap, detailing target specification, host discovery methods like ARP, ICMP, and TCP SYN pings, and port specification techniques. It covers service and version detection, along with leveraging the Nmap Scripting Engine (NSE) for advanced exploitation. | Recon |
| 2023-04-20 2023 | Wazuh and NMAP integrarion for Network Vulnerability Scans Wazuh and NMAP integrarion for Network Vulnerability Scans https://ift.tt/YLbjMJ9 | Recon |
| 2021-12-31 2021 | https://awesomeopensource.com/projects/go/nmap https://awesomeopensource.com/projects/go/nmap | Recon |
| 2021-09-13 2021 | Haklukes Guide to NmapPort Scanning is Just The Beginning Haklukes Guide to NmapPort Scanning is Just The Beginning | Recon |
gitleaks github.com/gitleaks #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | GitHub Secret Scanning 2026: New Patterns, Push Protection Library for GitHub Secret Protection offers enhanced detection of leaked secrets with 28 new patterns across 15 providers, expanded push protection for 39 token types, and AI-powered generic password detection via Copilot. Available to GitHub Team plan customers at $19 per month per active committer, it includes validity checks and improved API visibility. This solution aims to prevent credential-related breaches, which cost an average of $4.88 million, by blocking pushes of sensitive information like Supabase service keys and Vercel API tokens before they reach repositories. | Secrets |
| 2026-04-19 2026 | Pre-Commit Hooks for Secret Detection: Setup in 10 Minutes Library for implementing pre-commit hooks to prevent secrets from entering Git history. It details the setup process for tools like gitleaks, detect-secrets, and TruffleHog, offering solutions for immediate detection and blocking of credential leaks. The library emphasizes catching secrets at the cheapest point in the lifecycle, preventing the need for costly history rewrites and incident response by integrating these tools seamlessly into the Git commit workflow. | Secrets |
| 2026-04-19 2026 | Understanding Your Organization's Exposure to Secret Leaks — GitHub Library for assessing an organization's exposure to secret leaks, highlighting that over 39 million secrets were detected on GitHub in 2024 alone. This resource details how secrets like API keys and passwords are leaked through repository commits or misconfigurations, referencing the $4.88 million average cost of credential compromise breaches and the 2022 LastPass breach. It provides methods for quantifying risk, including inventory audits and benchmarking against OWASP ASVS and NIST guidelines, and mentions GitHub's secret risk assessment tool for enterprise customers. | Secrets |
| 2026-04-19 2026 | Exposed Developer Secrets Surge: AI Drives 34% Increase in 2025 Report detailing a 34% surge in exposed developer secrets during 2025, fueled by AI-assisted coding and expanded use of tools like Claude Code. GitGuardian's analysis highlights significant increases in leaked AI service credentials, including DeepSeek API keys, and identifies internal repositories as a six-fold greater risk. The report also notes that 28% of exposures occur outside code in platforms like Slack and Jira, with 64% of discovered secrets remaining unrevoked. | Secrets |
| 2026-04-19 2026 | GitHub Found 39M Secret Leaks in 2024 — The GitHub Blog Library for GitHub Advanced Security, featuring Secret Protection and Code Security, addresses the pervasive issue of exposed secrets, which led to 39 million leaks on GitHub in 2024. It emphasizes built-in push protection for public repositories and introduces affordable standalone products and a free point-in-time scan for organizations to identify and manage secret exposures effectively, partnering with vendors like AWS and Google Cloud Platform to enhance detection accuracy. | Secrets |
| 2026-04-11 2026 | Secret Scanning in CI Pipelines using Gitleaks Tool for integrating Gitleaks into GitLab CI pipelines for secret scanning. It details setting up a CI job to run Gitleaks against the OWASP Juice Shop application, demonstrating how to detect and prevent secret leaks like API keys, usernames, and secret keys from being committed. The entry also mentions the use of Git hooks as a pre-commit security measure. | Secrets |
| 2026-04-11 2026 | Add a Local Gitleaks Pre-Commit Hook Library for a local Gitleaks pre-commit hook that prevents accidental secrets from entering Git history. It utilizes files within `.git/` for a fast, easily removable safety net, supporting custom configurations via `.gitleaks.toml` and optional team-wide enforcement with Lefthook or GitHub Actions. | Secrets |
| 2026-04-10 2026 | Top 8 Git Secrets Scanners in 2026 Library of eight Git secrets scanners, including Jit, Gitleaks, GitGuardian, HawkScan, AWS Git Secrets Scanner, Spectral, Trufflehog, and GitHub Secret Scanning, designed to detect and neutralize exposed sensitive data like API keys and credentials within code repositories. These tools employ pattern-based and ML detection, custom rules, historical and pre-commit scanning, CI/CD integration, and remediation guidance to prevent data breaches and unauthorized access by shifting security left in the development lifecycle. | Secrets |
| 2026-04-03 2026 | TruffleHog vs. Gitleaks: A Detailed Comparison Library comparing TruffleHog and Gitleaks, popular secret scanning tools that identify hardcoded secrets like API keys and tokens within codebases and other environments. TruffleHog offers extensive scanning across S3 buckets and Docker images with advanced verification, while Gitleaks provides a lightweight, fast, and user-friendly experience focused on code repositories, excelling in CI environments. Both integrate into the SDLC to proactively detect and rectify leaked credentials, preventing unauthorized access and security breaches. | Secrets |
| 2026-04-03 2026 | Gitleaks - Find Secrets with Gitleaks Tool for detecting secrets like passwords, API keys, and tokens in git repos, files, and via stdin. Gitleaks supports scanning via `git`, `dir`, and `stdin` commands, and can be integrated as a pre-commit hook or GitHub action. It allows for baseline scanning to ignore old findings and custom rule configuration. | Secrets |
ffuf github.com/ffuf #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters Tool for web fuzzing: FFuF (Fuzz Faster u Fool) assists bug bounty hunters by rapidly discovering directories, files, and hidden parameters. It supports GET and POST requests, authenticated testing via cookies, recursive directory scanning, and allows customization of request delay, threading, and response code filtering. Installation involves obtaining the Go programming language and then using "go get" to install FFuF from its GitHub repository. | Recon |
| 2026-04-11 2026 | Fuzzing Web Apps using FFUF: Complete Guide Library for fuzzing web applications using FFUF, covering directory discovery, subdomain enumeration, virtual host fuzzing, multi-layer extension hunting, recursive scanning, authentication testing, and API endpoint discovery. It also details workflow optimizations like rate limiting and Burp Suite integration, while warning against common pitfalls such as unauthorized testing and aggressive scanning. | Fuzzing |
| 2026-04-11 2026 | FFUF Mastery: Advanced Web Fuzzing Library for advanced web fuzzing using FFuf, transforming standard workflows into an optimized offensive security methodology. It details sophisticated response matching techniques, practical attack scenarios leveraging HTTP response characteristics, and provides battle-tested command snippets and visual pipeline examples for immediate implementation in security testing. Techniques include response-pattern differential analysis, multi-vector fuzzing, layered match profiles, calibration for false positive reduction, content discovery with anti-false-positive profiles, and virtual host discovery. | Fuzzing |
| 2025-08-14 2025 | A ffuf Primer | Daniel Miessler Tool for command-line web attacks, ffuf emulates functionality similar to Burp Intruder and Dirbuster. This Go-based utility leverages input files to fuzz parts of URLs, including GET parameters and POST data, for discovering vulnerabilities like disallowed paths and credential stuffing. It offers extensive options for matching responses based on HTTP codes, line counts, or size, and can be used with wordlists such as curated.txt from the RobotsDisallowed project to enhance the likelihood of finding sensitive information. | Bug Bounty |
| 2023-09-03 2023 | ffuf advanced tricks - ACCEIS Library for advanced web application fuzzing, `ffuf` goes beyond simple directory enumeration. It supports injecting wordlists into URLs, GET/POST parameters, and HTTP headers, and can read from STDIN or use external generators like Radamsa. This resource details `ffuf`'s configuration file, enabling persistent settings for colorization, custom headers, proxy usage, and multiple simultaneous wordlists, enhancing its capabilities for penetration testing. | API SecFuzzing |
| 2022-01-16 2022 | How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes | Recon |
| 2022-01-10 2022 | ffuf - Fuzz Faster U Fool Library for fast web fuzzing written in Go. `ffuf` supports fuzzing URLs, headers, and POST data using the `FUZZ` keyword, and can filter responses by size (`-fs`) or status code (`-fc`). It offers features like recursive scanning, maximum runtime limits (`-maxtime`, `-maxtime-job`), and integrates with mutators via `--input-cmd`, enabling complex fuzzing scenarios such as JSON payload generation with Radamsa. Prebuilt binaries are available, and installation can be done via Homebrew or `go install`. | FuzzingRecon |
| 2021-02-16 2021 | A ffuf Primer | Daniel Miessler Tool, ffuf, is a flexible CLI-based web attack utility written in Go, often compared to Burp Intruder on the command line. It excels at fuzzing by injecting input from wordlists into various parts of a web application, including URLs, GET parameters, and POST data. ffuf can emulate tools like Dirbuster and even perform password guessing, making it a versatile addition to a web tester's toolkit, especially when combined with curated wordlists like those found in RobotsDisallowed. | Bug Bounty |
Shodan shodan.io #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | Shodan and Censys for beginners: How to find more vulnerabilities Guide for beginners on utilizing Shodan and Censys for vulnerability discovery, focusing on reconnaissance techniques. It details how to use specific search operators like `org`, `asn`, `http.status`, `ssl.cert.subject.CN`, `http.favicon.hash`, and `http.html` to identify exposed hosts, forgotten assets via expired certificates, and authentication panels. The guide also explains filtering by technologies such as PHP and finding directory listings. | Recon |
| 2026-04-17 2026 | Beyond Google: Navigating the Hidden Internet with Shodan and Censys Beyond Google: Navigating the Hidden Internet with Shodan and Censys | OSINT |
| 2026-04-17 2026 | sarenka: OSINT tool (Shodan/Censys) (GitHub) Tool for OSINT and attack surface discovery, SARENKA gathers information from Shodan, Censys, and Criminal IP, mapping CVEs to CWEs. It also retrieves local machine data, including installed software and network information, alongside utilities for hash calculation, Shannon entropy, and port scanning. Future plans include more cryptography tools and reconnaissance scripts. | OSINT |
| 2025-09-21 2025 | Flask 3.1.1 SSRF Zero-Day Shodan dork exposed 500 targets 0day PoC (CWE-918) Full Article: nullsecurityx.codes/ssrf-vulnerabi Video: youtube.com/watch?v=Levx_p Responsible disclosure & defensive demo only. #infosec #vulnerability #SSRF #BugBounty A zero-day vulnerability in Flask 3.1.1 related to SSRF was exposed through a Shodan dork, revealing 500+ potential targets. A proof of concept (PoC) for this vulnerability (CWE-918) was shared. The full article and a video demonstrating the issue were provided. The disclosure was done responsibly, and a defensive demo was included. The content emphasizes information security, vulnerability, SSRF, and Bug Bounty programs. The details can be found at nullsecurityx.codes/ssrf-vulnerabi and the video is available on YouTube. | SSRF |
| 2025-09-21 2025 | New video: Flask 3.1.1 SSRF Zero-Day Shodan dork exposed 500 targets 0day PoC (CWE-918). Watch now youtube.com/watch?v=Levx_p Responsible disclosure & defensive demo only. #infosec #vulnerability #SSRF #BugBounty A new video exposes a Flask 3.1.1 SSRF Zero-Day vulnerability using a Shodan dork that revealed 500+ targets with a 0day Proof of Concept (CWE-918). The content emphasizes responsible disclosure and includes a defensive demo. The video can be watched on YouTube. The focus is on information security, vulnerability, SSRF, and Bug Bounty programs. | SSRF |
| 2025-09-21 2025 | PREMIERE TONIGHT: Flask 3.1.1 SSRF Zero-Day (CWE-918) 8:00 PM (03) In this video: Discover 500 potential targets via Shodan dork PoC demo Turn on notifications so you dont miss it! Watch here: youtube.com/watch?v=Levx_p #BugBounty #CyberSecurity #SSRF A video premiering tonight at 8:00 PM showcases a Flask 3.1.1 SSRF Zero-Day vulnerability (CWE-918). The content includes a demonstration of discovering 500 potential targets using Shodan dork. Viewers are encouraged to turn on notifications to not miss the premiere. The video link is provided for watching. The focus is on Bug Bounty, Cybersecurity, and SSRF. | SSRF |
| 2025-04-04 2025 | 10 Rare and Worthy Websites and Services for Security Professionals While platforms like Shodan, OWASP, and VirusTotal are staples for security professionals, there are many lesser-known websites and services that offer equally valuable tools and resources. These… | OSINT |
| 2024-12-14 2024 | 🚀 Introducing ShodanSpider v2: Your Ultimate Free Tool for CVE Searching and Shodan Data Analysis… In today’s fast-paced cybersecurity world, staying ahead of vulnerabilities is critical. ShodanSpider v2 takes your security research to… | Recon |
Snyk snyk.io #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-17 2026 | What is a Software Bill of Materials (SBOM)? (Snyk) Library for generating and managing Software Bills of Materials (SBOMs), providing formal records of software components and their supply chain relationships. SBOMs enhance transparency, aid in vulnerability management, and support regulatory compliance, especially for software sold to the federal government as mandated by Executive Order 14028. Standards like SPDX, SWID, and OWASP CycloneDX are supported, enabling detailed analysis of dependencies, licenses, and potential exploits, complementing efforts like SLSA for supply chain integrity. | Supply Chain |
| 2026-04-03 2026 | Why 28 Million Credentials Leaked on GitHub in 2025 | Snyk Library for detecting and preventing leaked secrets, including API keys, database passwords, cloud IAM credentials, and AI service keys. It addresses accidental commits to Git, insecure .env file practices, supply chain attacks via malicious packages like Shai-Hulud and compromised versions of TruffleHog, and leaks through non-code surfaces such as Slack, Jira, and Docker Hub. The library also highlights the growing risk from AI-assisted development and MCP server credentials, differentiating its secret scanning capabilities from SAST tools by emphasizing the analysis of full Git history, including deleted files. | Secrets |
| 2025-08-14 2025 | Go Security cheatsheet | Snyk Blog Cheatsheet detailing eight Go security best practices for developers, emphasizing the use of Go Modules for dependency management and scanning dependencies for CVEs with tools like Snyk. It covers employing Go's standard crypto packages, utilizing `html/template` to prevent XSS attacks, exercising caution with subshelling, `unsafe`, and `cgo`, using reflection sparingly, and minimizing container attack surfaces. | |
| 2025-08-14 2025 | What is SSRF (server-side request forgery)? | Tutorial & examples | Snyk Learn Tutorial on Server-Side Request Forgery (SSRF) vulnerabilities, detailing how attackers can make arbitrary outbound requests from a server to access internal resources or cloud metadata. It demonstrates exploiting SSRF in a social app by reaching localhost and the AWS metadata endpoint (169.254.169.254), and discusses pivoting into internal networks, referencing CVE-2021-26084. The tutorial also covers prevention techniques like allowlisting and reconsidering dynamic request needs, noting SSRF's inclusion in the OWASP Top 10. | SSRF |
| 2025-07-23 2025 | New #CVE Record: CVE-2025-8020 All #Snyk versions of the package private-ip are #vulnerable to Server-Side Request Forgery (#SSRF) where an attacker can provide an IP or #hostname that resolves to a #multicast IP address (224.0.0.0/4) which is not included as part of the private The content discusses a new CVE record, CVE-2025-8020, indicating that all Snyk versions of the package private-ip are vulnerable to Server-Side Request Forgery (SSRF). This vulnerability allows an attacker to input an IP or hostname that resolves to a multicast IP address (224.0.0.0/4), not included in the private IP range. This poses a security risk. | SSRF |
| 2024-07-22 2024 | DOM Based XSS | Tutorial & Examples | Snyk Learn | Snyk Learn Tutorial on DOM XSS vulnerabilities, explaining how attackers manipulate the Document Object Model with client-side code injected via user-controllable sources like `eval()`, `document.write()`, or `innerHTML` sinks. It demonstrates exploiting a personalized profile color feature by escaping URL query parameters and recommends mitigating this by directly assigning color values to `document.body.style.color`, sanitizing input with libraries like `node-esapi`, or employing Content Security Policy (CSP) with nonces. | XSS |
| 2022-02-21 2022 | Go Security cheatsheet | Snyk Blog Cheatsheet detailing eight Go security best practices for Go developers. It covers using Go Modules for dependency management and scanning dependencies for CVEs with tools like Snyk. The resource recommends using Go's standard crypto packages and `html/template` to prevent XSS attacks. It also advises caution with subshelling, the `unsafe` package, and `cgo`, while recommending sparing use of reflection. Finally, it touches on minimizing container attack surfaces. |
Trivy trivy.dev #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-18 2026 | Trivy Supply-Chain Attack: Trusted Scanner Compromised Rotate CI/CD Secrets Now Library for securing CI/CD pipelines against supply-chain attacks, particularly concerning the Trivy scanner compromise (CVE-2026-33634, GHSA-69fq-xp46-6×23). The library details techniques for mitigating risks associated with compromised scanning tools, including mandatory secret rotation, auditing pipeline runs, pinning GitHub Actions tags to immutable SHAs, enforcing least-privilege for runners, and increasing monitoring. It highlights how attackers exploit tag mutability and privileged scanner access to steal credentials and access cloud environments. | Supply Chain |
| 2026-04-15 2026 | GitHub Actions Supply Chain Attack: Trivy Breach & Workflow Library detailing the GitHub Actions supply chain attack targeting the Trivy security scanner, where attackers leveraged misconfigured workflows and compromised credentials. This campaign, initially led by Hackerbot-claw and later by the TeamPCP group, resulted in code execution, token exfiltration, malicious artifact injection into Trivy's VSCode extension, and force-pushing of version tags. The attacks later expanded to compromise NPM packages and the Checkmarx AST GitHub Action, highlighting the pervasive risks of insecure CI/CD pipelines. | Supply Chain |
| 2026-04-06 2026 | CERT-EU Confirms Trivy Supply Chain Attack Led to Credential Exposure CERT-EU Confirms Trivy Supply Chain Attack Led to Credential Exposure | Secrets |
| 2026-04-04 2026 | European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack Writeup detailing the European Commission's data breach, confirming over 300GB of data theft from its AWS environment. Hackers exploited an API key compromised during the TeamPCP-led supply chain attack on Aqua Security's Trivy vulnerability scanner. The attackers leveraged tools like TruffleHog to discover secrets and exfiltrate data related to 71 clients of the Europa web hosting service, with the stolen information later appearing on the ShinyHunters leak site. | Supply Chain |
| 2026-04-03 2026 | Open Source Security Tool Trivy Hit by Supply Chain Attack Prompting Urgent Industry Response Tool Trivy was compromised in a supply chain attack, with malicious release v0.69.4 briefly distributed, exfiltrating sensitive data and executing malicious code. Attackers leveraged compromised credentials and manipulated release processes, impacting downstream systems and related tooling like GitHub Actions. This incident highlights the vulnerability of trusted open source scanners and CI/CD pipelines, prompting calls for artifact integrity verification, credential scoping, and zero-trust principles in software supply chains. | Supply Chain |
| 2026-04-02 2026 | Trivy supply chain intrusion reportedly compromises Cisco source code Library for identifying and mitigating supply chain risks, highlighted by the Trivy vulnerability scanner's role in a Cisco source code compromise. This incident involved threat actors leveraging illicit GitHub Action plugins to gain access to Cisco's build environment, steal credentials, and exfiltrate AWS keys. The attack resulted in the cloning of over 300 Cisco GitHub repositories, including sensitive AI-related code and data from government agencies and financial institutions, and points to potential further compromises from related LiteLLM and Checkmarx incidents. | Supply Chain |
Wireshark wireshark.org #
| Date | Resource | Topics |
|---|---|---|
| 2026-05-03 2026 | GitHub - SharonBrizinov/Holy-Grail-PCAP: "Holy Grail PCAP" is a capture file offering exceptional coverage across nearly all tcpdump/Wireshark encapsulation types and dissectors. Library for comprehensive Wireshark dissector code coverage analysis and bug hunting, featuring the "Holy Grail PCAP," a meticulously crafted capture file. This library includes over 1,600 dissectors across 186 link-layer types, including Bluetooth, USB, and CAN bus. It utilizes tools like `wirecov` for coverage measurement and `wirefuzz` for targeted dissector fuzzing, enabling bug discovery, CI/CD regression testing, and stress testing of packet processing tools. | Burp |
| 2026-05-01 2026 | Critical Wireshark Vulnerabilities Let Attackers Execute Arbitrary Code Via Malformed Packets Critical vulnerabilities have been discovered in Wireshark, a popular network protocol analyzer, that could allow attackers to execute arbitrary code on a victim's system. These vulnerabilities stem from the program's handling of malformed packets, meaning specially crafted network data can be used to exploit the flaw. Successful exploitation could lead to complete compromise of the affected system. Users are advised to update Wireshark to the latest version to patch these serious security risks. | RCE |
| 2026-05-01 2026 | Multiple Wireshark Flaws Allow Remote Code Execution via Malformed Packets Multiple vulnerabilities in Wireshark, a popular network protocol analyzer, have been discovered. These flaws allow remote code execution when the software processes specially crafted packets. Attackers could exploit these vulnerabilities by sending malformed data to a Wireshark user, potentially compromising their system without any user interaction. The severity of these issues highlights the importance of keeping Wireshark updated to the latest version to mitigate these security risks. | RCE |
| 2023-11-05 2023 | TrafficWatch - TrafficWatch A Packet Sniffer Tool Allows You To Monitor And Analyze Network Traffic From PCAP Files TrafficWatch - TrafficWatch, A Packet Sniffer Tool, Allows You To Monitor And Analyze Network Traffic From PCAP Files https://ift.tt/c1tg2uv | Recon |
| 2023-01-31 2023 | Creating an Advanced Network Packet Sniffer in Python: A Step-by-Step Guide The content is a step-by-step guide on creating an advanced network packet sniffer using Python. It provides detailed instructions on how to build the sniffer tool, which can capture and analyze network packets for various purposes. The guide likely covers topics such as setting up the necessary libraries, capturing packets, analyzing packet data, and potentially implementing additional features for advanced functionality. Overall, the content aims to help readers understand the process of creating a network packet sniffer using Python through a structured and informative guide. | Python |
| 2022-01-15 2022 | Capturing Network Traffic With Python And TShark Capturing Network Traffic With Python And TShark | Python |
MobSF github.com/MobSF #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-22 2026 | Reversing Android Apps: Bypassing Detection Like a Pro Library for bypassing common Android app detection mechanisms like Frida, root checks, and SSL pinning. Techniques include utilizing Magisk DenyList, employing Frida codeshare scripts, attaching Frida after app launch, static analysis with Jadx to identify and patch detection code, using Objection's `patchapk` feature, dumping loaded classes, tracing method calls, reversing native JNI code, and patching SSL pinning with `apk-mitm` for network traffic analysis. | Mobile |
| 2026-04-11 2026 | Mobile Security Framework - MobSF Documentation Mobile Security Framework - MobSF Documentation | Mobile |
| 2026-04-11 2026 | MobSF: Mobile Security Framework (GitHub) Library for mobile application security, penetration testing, malware analysis, and privacy analysis on Android, iOS, and Windows Mobile. MobSF supports static analysis of APK, IPA, and APPX binaries, as well as dynamic analysis with instrumented testing, runtime data, and network traffic analysis for Android and iOS. It integrates with DevSecOps pipelines via REST APIs and CLI tools. | Mobile |
| 2026-04-03 2026 | OWASP Mobile Top 10 and MobSF Library for addressing the OWASP Mobile Top 10 risks, including M1 (Improper Credential Usage) with examples like hardcoded credentials and insecure transmission, M2 (Inadequate Supply Chain Security) concerning malware injection, M3 (Insecure Authentication/Authorization) detailing hidden service requests, M4 (Insufficient Input/Output Validation) leading to remote code execution, M5 (Insecure Communication) through lack of certificate inspection, M6 (Inadequate Privacy Controls) via improper log sanitization, M7 (Insufficient Binary Protections) exposing API keys, and M8 (Security Misconfiguration) from insecure default settings. | Mobile |
| 2021-06-11 2021 | mobsfscan Library for static analysis of Android and iOS source code, mobsfscan detects insecure patterns in Java, Kotlin, XML, Swift, and Objective C. It leverages MobSF static analysis rules, semgrep, and libsast, identifying vulnerabilities like CWE-295 Improper Certificate Validation and CWE-532 Insertion of Sensitive Information into Log File. Supported output formats include JSON, SARIF, SonarQube, and HTML, enabling integration into automated security assessment workflows. | Mobile |
Caido caido.io #
| Date | Resource | Topics |
|---|---|---|
| 2025-12-10 2025 | Web App Hacking: Finding Web App Vulnerabilities with Caido Scanner Caido just became a serious Burp killer.
Scanner plugin auto-detects vulns as you browse + launches targeted attacks on suspicious endpoints:
https://t.co/wkiXeRK5CU | Burp |
| 2025-12-03 2025 | Web App Hacking: Finding Web App Vulnerabilities with Caido Scanner Caido just became a serious Burp killer.
Scanner plugin auto-detects vulns as you browse + launches targeted attacks on suspicious endpoints:
https://t.co/GqmmOXsL75
@three_cube | Burp |
| 2023-10-04 2023 | A lightweight web security auditing toolkit Toolkit for web security auditing that enhances manual testing with AI and teamwork. Caido integrates with LLM providers like Anthropic, Google, and OpenAI through OpenRouter, enabling AI-powered plugins and programmatic access via its Client SDK. Features include autonomous agents for payload generation and task execution, precise request/response searching with HTTPQL, and ad-hoc automation via a node-based system. The platform boasts over 6,000 active users, 54+ community plugins, and a Discord community of 4,500+ members. | Burp |
| 2023-07-19 2023 | Web App Hacking with Caido.io Web App Hacking with Caido.io https://www.youtube.com/watch?v=lW-u_2EByT4 | API SecBurp |
mitmproxy mitmproxy.org #
| Date | Resource | Topics |
|---|---|---|
| 2026-01-17 2026 | pwviptbl/ProxyHunter: Aplicação Python com interface gráfica que permite configurar regras de interceptação para modificar parâmetros de requisições HTTP. Quando o navegador envia uma requisição para uma rota configurada, o proxy intercepta, modifica apenas os parâmetros especificados e encaminha a requisição mantendo todos os outros parâmetros originais. Tool that intercepts HTTP requests to modify specific parameters. ProxyHunter is a Python application with a graphical interface that allows users to configure interception rules for HTTP requests. It intercepts requests to configured routes, modifies only specified parameters, and forwards the request while preserving all other original parameters. Features include a GUI, multiple rule configuration, GET and POST support, individual rule activation/deactivation, JSON persistence, configurable port, manual interception, WebSocket support, an advanced Intruder, and a vulnerability scanner detecting SQL Injection, XSS, CSRF, Path Traversal, and exposed sensitive information. | Python |
| 2025-11-24 2025 | A Terminal client for HTTP/GraphQL/gRPC with support for SSH tunnels, WebSockets, SSE, workflows, profiling, OpenAPI and response diffs. #golang
https://t.co/sDSO3DWkkl | GraphQL |
| 2024-11-29 2024 | Python Twisted proxy - how to intercept packets Library for intercepting and modifying HTTP request and response bodies using Python's Twisted framework. Demonstrates a basic proxy setup using `twisted.web.proxy` and `twisted.internet.reactor`, enabling developers to inspect and alter data as it flows through the proxy. The provided code snippet serves as a starting point for building custom HTTP proxy functionalities. | Python |
| 2021-01-22 2021 | projectdiscovery/proxify: Swiss Army knife Proxy tool for HTTP/HTTPS traffi Tool: proxify is a Swiss Army knife proxy for rapid HTTP/HTTPS traffic manipulation. It supports request/response dumping, filtering, and manipulation via a DSL language, and can act as an upstream HTTP or SOCKS5 proxy. Features include TLS MITM support, an embedded DNS server, plugin support for protocol decoding, and the ability to replay dumped traffic into Burp Suite. Proxify can intercept non-HTTP traffic and supports invisible and thick client proxying. |
Postman postman.com #
| Date | Resource | Topics |
|---|---|---|
| 2025-02-10 2025 | GitHub - usebruno/bruno: Opensource IDE For Exploring and Testing Api's (lightweight alternative to postman/insomnia) Library for API exploration and testing, Bruno offers a privacy-focused, offline-first alternative to Postman and Insomnia. It stores API collections in local filesystem folders using the Bru markup language, facilitating collaboration via Git or other version control systems. Bruno is available for Mac, Windows, and Linux, with installation options including binary downloads and package managers like Homebrew, Chocolatey, Scoop, Snap, Flatpak, and Apt. | API Sec |
| 2024-12-13 2024 | Server SSL certificate verification - HTTPie 3.2.4 (latest) docs Library for interacting with HTTP services from the command line, designed for human-friendly testing and debugging. It supports intuitive syntax, formatted output, JSON, forms, uploads, HTTPS, proxies, authentication, custom headers, persistent sessions, downloads, and a plugin system. Installation instructions are provided for various package managers and operating systems, including standalone executables. The documentation details usage for custom methods, headers, JSON data, form submissions, offline requests, authentication, file uploads/downloads, sessions, and URL parameters. | API Sec |
| 2022-06-09 2022 | Favorite tweet by @fardeenahmed411 Favorite tweet:
API Bug-Bounty Tools Check list (Part - 1) - Postman (It is like Burpsuite for API) - APISec - AppKnox - Synopsis API Scanner - Data Theorem API Secure #cybersecuritytips #bugbountyti... | API SecBug Bounty |
| 2021-08-25 2021 | API Testing with HTTPie API Testing with HTTPie | API Sec |
BeEF beefproject.com #
| Date | Resource | Topics |
|---|---|---|
| 2023-04-02 2023 | How to Hack Web Browsers with BeEF Framework How to Hack Web Browsers with BeEF Framework https://ift.tt/r8zkdW9 | XSS |
| 2022-05-11 2022 | Favorite tweet by @Nickieyey Favorite tweet:
Top XSS (Cross Site Scripting) Tools : 1) BeeF 2) BlueLotus_XSSReceiver 3) xssor2 4) Xsser-Varbaek 5) Xsser-Epsylon 6) Xenotix #pentesting #ethicalhacking #cybersecurity #CyberSec #we... | Bug BountyXSS |
| 2021-12-06 2021 | How to run BeEF behind an nginx reverse proxy with SSL correctly Library for configuring BeEF behind an nginx reverse proxy with SSL, addressing "Blocked Mixed Active Content" errors. It details BeEF's `config.yaml` settings for `allow_reverse_proxy`, `public`, and `public_port`, along with Nginx `proxy_pass` directives to correctly handle HTTPS requests and ensure BeEF hooks function on secure pages. | Recon |
dirsearch github.com/maurosoria #
| Date | Resource | Topics |
|---|---|---|
| 2025-08-14 2025 | My First Case of SSRF Using Dirsearch | by Mba-oji Chiagoziem | Medium The content appears to be a personal account titled "My First Case of SSRF Using Dirsearch" by Mba-oji Chiagoziem on Medium. The author likely shares their experience encountering a Server-Side Request Forgery (SSRF) vulnerability while using the tool Dirsearch. The article may delve into the details of how the SSRF vulnerability was discovered, the implications of such a vulnerability, and potentially offer insights or lessons learned from the experience. | SSRF |
| 2023-10-04 2023 | Directory Listing Directory Listing https://ift.tt/hdv6BCV | Recon |
| 2023-09-03 2023 | GitHub - dirkjanm/adidnsdump: Active Directory Integrated DNS dumping by any authenticated user Library for Active Directory Integrated DNS dumping, allowing any authenticated user to enumerate and export all DNS records in Domain or Forest DNS zones for internal network reconnaissance. It requires impacket and dnspython for functionality and can be installed via pip or from Git. The tool supports direct network use or operation via an implant using proxychains with the `--dns-tcp` option. | AuthN |
semgrep semgrep.dev #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-16 2026 | tj-actions/changed-files Compromised - Semgrep Semgrep rule for detecting compromised GitHub Actions, specifically targeting `tj-actions/changed-files` and `reviewdog/action-setup@v1`. This action, `tj-actions/changed-files`, was previously compromised and may have leaked secrets. The rule helps identify usages of these actions within CI pipelines, enabling prompt remediation and security audits. Users can run this rule locally or within the Semgrep AppSec Platform in blocking mode to prevent further compromise. | Supply Chain |
| 2026-04-03 2026 | Insecure Deserialization in Python | Semgrep Library for detecting insecure deserialization vulnerabilities in Python code, focusing on the dangers of libraries like `pickle`, `dill`, `jsonpickle`, and `shelve` when processing untrusted input. It highlights how these libraries can lead to remote code execution and provides examples of exploitation, including a demonstration with `pickle.dumps` and `os.system`. The library's rules identify data flow from untrusted sources to sensitive deserialization functions, offering practical recommendations to avoid risks such as avoiding `pickle` for untrusted data, using safer alternatives like JSON or `PyYAML`'s `safe_load`, and integrating Semgrep scans into CI pipelines. Specific mitigations for Django, NumPy, and PyTorch are also mentioned. | Python |
| 2021-12-13 2021 | Semgrep Semgrep | RCESupply Chain |
subfinder github.com/projectdiscovery #
| Date | Resource | Topics |
|---|---|---|
| 2026-04-19 2026 | SubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025 SubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025 | Recon |
| 2026-04-03 2026 | Subfinder Complete Guide 2025: Subdomain Enumeration Mastery Library for stealthy subdomain enumeration, Subfinder gathers subdomains from passive online sources to map an organization's attack surface. It supports extensive configuration options, including selecting sources, filtering patterns, using custom resolvers, and integrating API keys for services like BinaryEdge, Censys, GitHub, Shodan, and VirusTotal. Subfinder can output results in plain text or JSON, and it integrates well with other ProjectDiscovery tools like httpx and nuclei for comprehensive reconnaissance. | Recon |
| 2019-08-20 2019 | Automated monitoring of subdomains for fun and profit — Release of Sublert "Sublert" is a tool released for automated monitoring of subdomains for bug bounty programs. The bug bounty industry is rapidly growing, leading to fierce competition among programs. Sublert aims to assist in identifying security vulnerabilities in subdomains, potentially leading to financial rewards for bug hunters. | Bug Bounty |