appsec.fyi

Tools

449 application security resources indexed across 22 tools — guides, tutorials, exploits, and reviews.

Browse by tool

Resources tagged to a specific AppSec tool — Burp Suite, sqlmap, nuclei, Frida, and others. Tools with fewer than 3 resources are not listed. The same resource can appear under multiple topics; topic tags in each row link back to the topic page.

Burp Suite portswigger.net #

244 resources across 23 topics: AI, API Sec, AuthN, AuthZ, Bug Bounty, Burp, CSRF, Deser, Fuzzing, golang, GraphQL, IDOR, JWT, Python, RCE, Recon, Secrets, SQLi, SSRF, SSTI, Talks, XSS, XXE.

DateResourceTopics
2026-04-22 2026PortSwigger Lab: Exploiting a Mass Assignment Vulnerability
Lab walkthrough demonstrating exploitation of a mass assignment vulnerability to purchase a product. The lab involves logging in with `wiener:peter`, adding an item to the basket, and then identifying and manipulating a `chosen_discount` parameter within the `/api/checkout` POST request. By adding this hidden parameter and altering its value, users can bypass credit limitations and solve the exercise.
API Sec
2026-04-22 2026GraphQL - PortSwigger Lab Writeup
Writeup detailing GraphQL vulnerabilities and exploitation techniques. It covers bypassing introspection query regex validation, brute-forcing logins using aliases to circumvent rate limiting, and performing CSRF by converting requests to `x-www-form-urlencoded`. The entry also demonstrates how to find hidden GraphQL endpoints using directory fuzzing with Gobuster.
Bug Bounty
2026-04-22 2026SulphurAPI: Burp Suite extension for automating OWASP API Top 10 detection
Extension for automating OWASP API Top 10 detection within Burp Suite. SulphurAPI includes checks for mass assignment, authentication, and authorization vulnerabilities, alongside OpenID Connect/OAuth2 management and advanced OpenAPI parsing for versions 2.0 to 3.1.1.
Burp
2026-04-22 2026Awesome Burp Extensions 2025
Library of curated Burp extensions for enhancing web application penetration testing. Features include scanners for vulnerabilities like Log4Shell (CVE-2021-44228), HTTP Request Smuggling, and Java deserialization. Additional extensions aid in discovering Content Security Policy (CSP) bypasses, identifying software versions, detecting reverse proxies, and testing for Cloudflare origin IPs, among many other specialized checks and integrations.
Burp
2026-04-22 2026The Future of Security Testing: AI-Powered Extensibility in Burp
Library for AI-powered extensibility in Burp Suite Professional, leveraging the Montoya API to integrate AI capabilities for enhanced security testing and automation. This allows for seamless integration of AI, exemplified by Gareth Heyes' enhanced Hackvertor extension, which enables custom transformations without coding. Users receive free AI credits to experiment and build their own AI-powered extensions, with options to submit them to the BApp store.
Burp
2026-04-22 2026Filtering the WebSockets history with scripts
Library for filtering WebSockets history in Burp Suite, allowing users to create and load custom Java-based scripts. Users can write new scripts from templates, convert existing filter settings into scripts, or import scripts from their Bambda library. The library supports two key Montoya API objects, `ProxyWebSocketMessage` and `Utilities`, to facilitate script development for analyzing and filtering WebSocket traffic based on criteria like message direction and payload length.
Burp
2026-04-22 2026Filtering the HTTP history with scripts (Bambdas)
Library for creating custom Java-based scripts, known as Bambdas, to filter Burp Suite's HTTP history. Users can load pre-existing scripts from their library or create new ones using built-in templates or by converting existing filter settings. The library leverages the Montoya API and provides a GitHub repository for community contributions and examples, enabling advanced traffic analysis based on criteria like response status codes and cookie presence.
Burp
2026-04-22 2026Developing AI features in Burp extensions
Library for integrating AI capabilities into Burp Suite extensions via the Montoya API. This resource details how extensions must declare AI feature support using `EnhancedCapability.AI_FEATURES` and verify availability with `Ai.isEnabled()`. It explains sending single-shot and multi-turn prompts using `Message` objects for system, user, and assistant roles, and handling responses through `PromptResponse`.
Burp
2026-04-22 2026Burp AI - PortSwigger Documentation
Library integrating AI capabilities into Burp Suite for enhanced security testing. Features include AI in Repeater for custom prompts, Explore Issue for autonomous vulnerability investigation, and Explainer for understanding web technologies. It also offers AI-powered false positive reduction for Broken Access Control, automated recorded logins, and extensible AI features via the Montoya API, all while prioritizing user control, data privacy, and industry-standard security.
Burp
2026-04-22 2026Bambdas - PortSwigger Documentation
Library for scripting Burp Suite's interface to personalize tasks. Bambdas allow for custom match-and-replace rules, table columns, filters, and scan checks. Scripts can be saved, imported from sources like the Bambdas GitHub repository, and reused across projects. PortSwigger warns that Bambda scripts can execute arbitrary code, advising caution with unverified sources.
Burp
2026-04-22 2026Hunting for IDOR and BAC in B2B Apps with Burp Authorize
Hunting for IDOR and BAC in B2B Apps with Burp Authorize
IDOR
2026-04-22 2026IDOR-Scanner: Burp Suite Extension for Automated IDOR Detection
Extension for Burp Suite that automatically detects Insecure Direct Object Reference (IDOR) vulnerabilities. It passively scans HTTP requests and responses for numeric fields in URL paths, query parameters, JSON, and form data. Actively, it increments these numeric fields, sending modified requests to identify confirmed IDORs by checking for differing response sizes and 200 OK statuses. An option to right-click and scan specific issues is also provided.
IDOR
2026-04-20 2026Meta and PortSwigger drive offensive security further to find what others miss
Library. This partnership between Meta Bug Bounty and PortSwigger integrates Meta’s bug bounty program with Burp Suite Professional, aiming to enhance vulnerability discovery and researcher skills. Selected HackerPlus Silver league researchers receive Burp Suite Professional licenses to leverage its technical capabilities alongside Meta's collaborative program, fostering improved tooling and education for the security community.
Bug Bounty
2026-04-19 2026Pentest-Mapper: Burp Extension for Pentesters & Bug Bounty
Library for Burp Suite that maps application testing flows with custom checklists. Pentest-Mapper logs API calls, allowing users to connect them to specific vulnerabilities from a loaded checklist. It also tracks test cases, enables vulnerability mapping with severity, and offers auto-save, import/export functionality, and auto-logging of scoped APIs.
Burp
2026-04-19 2026Burp Suite Extension: Copy For — Black Hills InfoSec
Library for Burp Suite that generates command-line syntax for security tools like `curl`, `ffuf`, `jwt_tool.py`, `Nikto`, `Nmap`, `Nuclei`, and `wget` directly from requests. It supports variable substitution and configurable flags, allowing users to create custom commands.
Burp
2026-04-19 2026Burp AI — PortSwigger
Burp AI — PortSwigger
Burp
2026-04-19 2026Pentest Mapper: Burp Extension for Application Pentesting
Extension for Burp Suite that integrates request logging with a custom application testing checklist. It enables users to map application flows and API calls, link them to vulnerabilities from a customizable checklist, and track parameters and severity. Features include auto-saving, import/export functionality, and the ability to map individual requests to vulnerabilities with optional CVSS scoring.
Burp
2026-04-19 2026Pentest Mapper — PortSwigger BApp Store
Library for mapping application flows during penetration testing. Pentest Mapper integrates Burp Suite request logging with a custom checklist, allowing testers to connect API calls to specific functions and map identified vulnerabilities. This Burp Suite extension facilitates a structured approach to application analysis and vulnerability assessment.
Burp
2026-04-17 2026Maximizing IDOR Detection with Burp Suite's Autorize
Library for Burp Suite's Autorize extension, this resource details how to leverage it for identifying Insecure Direct Object Reference (IDOR) vulnerabilities by automatically testing authorization with low-privileged user session cookies. It explains the extension's functionality, including its enforcement status detection and customizable filters for identifying authorization bypasses, and provides installation and usage instructions with examples against OWASP Juice Shop.
IDOR
2026-04-17 2026Manual and semi-automated testing for IDORs using Burp Suite
Library for semi-automated and manual testing of Insecure Direct Object References (IDORs) using Burp Suite. It details how to leverage the Autorize plugin for automated checks by sending captured requests from different user contexts and offers a manual approach by identifying and manipulating object identifiers within Burp Suite's Repeater tool, referencing PortSwigger labs as an example.
IDOR
2026-04-17 2026Testing for IDORs (PortSwigger Burp docs)
Library for testing Insecure Direct Object References (IDORs), a common access control vulnerability where an application directly uses user-supplied input to access objects. This resource guides users through identifying potential IDORs in parameters, forwarding requests to Burp Intruder, configuring a Sniper attack with payload positions, and analyzing responses to confirm unauthorized access, using an example involving a user ID parameter.
IDOR
2026-04-16 2026IDOR Hunting with Burp Suite: A $1,000 Bug Bounty Case Study
Tool for hunting Insecure Direct Object Reference (IDOR) vulnerabilities, focusing on a $1,000 bug bounty case. It details how Burp Suite's Proxy, Repeater, and Intruder features can be used to identify and automate the discovery of IDORs by tampering with object identifiers and analyzing responses. The entry also covers common IDOR scenarios in APIs, including GraphQL and RESTful endpoints, and provides developer-side prevention techniques like server-side authorization checks and the use of indirect or signed references.
IDOR
2026-04-16 2026InQL: Advanced GraphQL Security Testing Burp Extension
Library for advanced GraphQL security testing, InQL integrates with Burp Suite. It offers a scanner for auto-generating queries and mutations, customizable scans with 'Points of Interest' analysis for vulnerability detection, and circular reference detection. InQL also supports batch queries, custom headers, engine fingerprinting even when introspection is disabled, and interactive schema visualization through GraphiQL and GraphQL Voyager.
GraphQL
2026-04-16 2026Burp Suite Professional Testing Handbook
Library for Burp Suite Professional, an HTTP interception proxy with features for web application security testing. It aids in identifying server-side and client-side vulnerabilities by intercepting and manipulating requests/responses, fuzzing payloads with Intruder, and analyzing traffic with Proxy and Scanner. The handbook also mentions Burp's DOM Invader extension and Trail of Bits webinars on mastering web research with Burp Suite.
Burp
2026-04-16 2026Bambdas Collection for Burp Suite Professional and Community
Library of Bambdas for Burp Suite, offering scripts for table filters, custom columns, Repeater actions, match and replace rules, and custom scan checks. Developed by PortSwigger and the community, these scripts enhance Burp Suite's functionality, with Java-based checks available in this repository and BChecks in a separate repo. Instructions cover importing, updating, and contributing scripts, with security warnings about executing arbitrary code. Resources include detailed documentation and video tutorials on various Bambda functionalities.
Burp
2026-04-16 2026BurpSuite for Pentester - Vulnerability Hunting Cheatsheet
Library for penetration testers and bug bounty hunters, this practical Burp Suite cheat sheet aids in efficiently discovering web application vulnerabilities from P4 to P1. It offers a structured reference for web application security testing, guiding users on leveraging Burp Suite's features for traffic interception, request analysis, parameter fuzzing, and identifying vulnerabilities in modern web applications.
Burp
2026-04-16 2026Weaponize Your Burp - Bug Bounty Hunting Automation
Library for automating Burp Suite for bug bounty hunting. This project weaponizes Burp Suite with extensions like Burp Bounty Pro, Logger++, and AutoRepeater. It details a methodology for integrating custom payloads into AutoRepeater and using Logger++ filters to identify potential vulnerabilities, then sending suspicious requests to Repeater for exploitation. Examples demonstrate configuring custom payloads to enhance bug hunting capabilities.
Burp
2026-04-16 2026Smart Automation with Burp Suite - YesWeHack
Library for automating Burp Suite workflows, this resource details using passive scanners like the built-in passive scanner and passive crawler, alongside extensions such as BChecks, Burp Bounty, and Logger++, to streamline bug bounty efforts. It explains how to combine active and passive scanning to efficiently gather information and discover vulnerabilities, emphasizing the importance of custom headers for tracking BCheck requests and leveraging error messages for deeper analysis, while still advocating for manual testing to complement automated findings.
Burp
2026-04-16 2026A Guide to Build Burp Suite Extensions Using Montoya API and Java
A Guide to Build Burp Suite Extensions Using Montoya API and Java
Burp
2026-04-16 2026Power Up Pen Tests: Create Burp Suite Extensions with Montoya API
Library for developing Burp Suite extensions using the Montoya API, streamlining tasks like authentication handling, API data mining, and UI visualization. This API, introduced in Burp Suite 2022.9.5, offers improved object-oriented design, WebSocket support, and simplified HTTP message manipulation compared to the older extender API, enabling developers to create more robust and flexible tools like the example "BurpCage" extension that replaces images with Nicolas Cage photos.
Burp
2026-04-16 2026Burp Suite Extensions - Overview and Introduction with Kotlin
Library for developing Burp Suite extensions, focusing on the modern MontoyaApi with Kotlin. This resource details how to create powerful extensions, introducing concepts like Bambdas for filtering and BChecks for custom scan checks. It showcases the development of the HeaderMate extension, which automates server response header evaluation against OWASP recommendations and configurable rules, offering features like selective host checking, issue creation toggling, and CSV export.
Burp
2026-04-16 2026Creating Burp Extensions: A Beginner's Guide - Black Hills InfoSec
Library for creating Burp Suite extensions. This resource guides beginners through developing custom functionalities for Burp Suite, a web application proxy essential for security testing. It explains what Burp extensions are, why they enhance testing capabilities, and covers the necessary tools and languages for development. The presentation introduces the Montoya API for integration and showcases a practical example of a JWT editor extension, illustrating how these additions expand Burp Suite's utility beyond its default features.
Burp
2026-04-16 2026PortSwigger's Top 10 Web Hacking Techniques of 2025
Reference listing the top 10 web hacking techniques of 2025, curated by an expert panel from community nominations. Techniques include Parser Differentials, Playing with HTTP/2 CONNECT, XSS-Leak, Next.js cache poisoning, Cross-Site ETag Length Leak, SOAPwn (RCE via HttpWebClientProtocol flaw), Unicode normalization attacks like "Lost in Translation," blind SSRF visibility techniques, ORM leaks, and "Successful Errors" for blind server-side template injection. The analysis highlights trends in side-channel attacks and new exploitation primitives.
Bug Bounty
2026-04-14 2026Found SSRF vulnerability allowed to access admin panel and delete user account. StockAPI Burp Intruder Admin URL Deleted user account (carlos) #SSRF #WebSecurityAcademy #Portswigger #Lab #Vulnerability pic.x.com/EiIMQEUyxQ
Found SSRF vulnerability allowed to access admin panel and delete user account. StockAPI  Burp Intruder Admin URL Deleted user account (carlos) #SSRF #WebSecurityAcademy #Portswigger #Lab #Vulnerab...
SSRF
2026-04-10 2026OWASP Testing for Server Side Template Injection
Reference for testing Server-Side Template Injection (SSTI) vulnerabilities in web applications, a common flaw found when user input is unsafely embedded in templating engines like Jinja2 and Twig, potentially leading to remote code execution. The guide details methods for detecting injection points, identifying templating engines, and building exploits, referencing tools such as Tplmap and Burp Suite extensions. It also covers testing in both plaintext and code contexts.
SSTI
2026-04-10 2026Server-side template injection PortSwigger KB
Library detailing Server-side template injection, a vulnerability where user input is unsafely embedded into server-side templates, potentially allowing arbitrary code execution and server control. It covers identifying template engine types, mapping the attack surface, and auditing exposed objects, noting severity varies by engine. Remediation strategies include avoiding user-generated templates, using logic-less engines like Mustache, or sandboxing rendering environments. This vulnerability is classified under CWE-94, CWE-95, and CWE-116, often carrying a high severity.
SSTI
2026-04-10 2026Template Injection Research | PortSwigger Research
Library covering template injection, detailing both Client Side Template Injection (CSTI) and Server Side Template Injection (SSTI). Learn techniques to bypass Content Security Policy (CSP) and exploit client-side vulnerabilities similar to Cross-Site Scripting (XSS), including breaking the AngularJS sandbox as presented at BSides Manchester. Explore server-side exploitation, detecting templating engines, and achieving Remote Code Execution (RCE), including research presented at Black Hat USA on SSTI.
SSTI
2026-04-10 2026Server-Side Template Injection | PortSwigger Research
Reference for Server-Side Template Injection (SSTI) details a methodology for detecting and exploiting template engines like Twig and FreeMarker, which are commonly used to embed dynamic content. SSTI vulnerabilities arise when user input is unsafely embedded in templates, potentially leading to Remote Code Execution (RCE). The research outlines detection techniques for both "text" and "variable" contexts, emphasizing the importance of identifying the specific template engine and its documentation to craft effective exploits, including escaping sandbox modes.
SSTI
2026-04-10 2026Server-side template injection | Web Security Academy
Library explaining server-side template injection, a vulnerability where attackers inject malicious payloads into templates to achieve remote code execution or access sensitive data. It details how these vulnerabilities arise when user input is directly concatenated into templates instead of being passed as data, and outlines detection methods like fuzzing with special characters and testing mathematical operations in plaintext or code contexts, applicable to engines like Twig and Freemarker.
SSTI
2026-04-10 2026PortSwigger KB: JWT none algorithm supported
Library for detecting JWT "none" algorithm vulnerabilities. This flaw allows an attacker to tamper with the JWT's `alg` header to "none", remove the signature, and submit an unsigned token. If the server accepts this, attackers can escalate privileges or impersonate users by modifying arbitrary claims in the payload. Remediation involves configuring JWT libraries to reject unsecured tokens and only accept cryptographically strong algorithms.
JWT
2026-04-10 2026Working with JWTs in Burp Suite
Library for testing JWT authentication bypass vulnerabilities in Burp Suite. It allows users to view and decode JWTs within Burp Inspector, and then utilize the JWT Editor extension to generate cryptographic signing keys, edit token headers and payloads, and resign the modified JWT with a valid signature. The extension automatically flags requests containing JWTs, streamlining the identification and manipulation process.
JWT
2026-04-10 2026JSON Web Token Attacker Burp extension
Extension that assists in pentesting applications utilizing JavaScript Object Signing and Encryption (JOSE), specifically targeting JSON Web Tokens. This tool automates the discovery and testing of vulnerabilities within JOSE implementations, aiding security professionals in identifying potential weaknesses during application assessments.
JWT
2026-04-10 2026JWT Scanner Burp extension
Extension for Burp Suite that scans for JWT vulnerabilities by highlighting tokens and initiating scans. It supports forging public keys when they are not exposed, allowing for further exploitation and vulnerability discovery by rerunning scans after successful forging.
JWT
2026-04-10 2026PortSwigger jwt-editor: Burp Suite extension for editing and signing JWTs
Library for manipulating JSON Web Tokens (JWTs) within Burp Suite, this tool detects and allows editing, signing, verifying, encrypting, and decrypting JWTs in HTTP and WebSocket messages. It offers detection of JWTs, highlighting, and an Intruder payload provider. Functionality includes importing/exporting cryptographic keys, editing JWS/JWE components with JSON and hex editors, and performing attacks such as "none" algorithm bypass, HMAC key confusion, embedded JWK, signing with an empty HMAC key, Psychic signatures (CVE-2022-21449), and collaborator integration.
JWT
2026-04-10 2026Blind SSRF with Burp Collaborator
Blind SSRF with Burp Collaborator
SSRF
2026-04-10 2026Mastering Blind SSRF Detection With Burp Suite
Analysis of Blind SSRF detection using Burp Suite, detailing techniques like header bruteforcing with Intruder, out-of-band detection via Collaborator, and real-time monitoring with the Taborator extension. It covers advanced payload strategies including numerical ranges and cloud metadata endpoint enumeration, alongside Python scripting for automation and integration with the Burp API, emphasizing the critical need for proactive SSRF testing against evolving cloud-focused exploits.
SSRF
2026-04-10 2026Testing for Blind SSRF with Burp Suite
Tutorial on detecting blind SSRF vulnerabilities using Burp Suite's Collaborator. This method involves injecting a Collaborator payload into an HTTP request, often within parameters like `productId` or headers like `Referer`, and then monitoring the Collaborator tab for out-of-band interactions from the target application. The presence of these interactions confirms the application's susceptibility to blind SSRF.
SSRF
2026-04-10 2026Uncovering Blind SSRF Using Burp Collaborator
Uncovering Blind SSRF Using Burp Collaborator
SSRF
2026-04-10 2026Burp Suite Certified Practitioner Guide 2026
Guide to the Burp Suite Certified Practitioner (BSCP) exam, PortSwigger’s hands-on web application security certification. This resource details the exam format, including its remote, proctored, timed structure with two live applications, and the three sequential stages required per application. It emphasizes demonstrating exploit impact, using Burp Suite Professional and allowed third-party tools like ysoserial, and mastering techniques such as XSS exploitation, SQL injection, and SSRF. The guide offers preparation strategies, including PortSwigger’s official prep path, practice exams, and sample 30, 60, and 90-day study plans, to help candidates achieve certification.
Burp
2026-04-10 2026Top 10 Burp Extensions Every Pentester Should Use
Top 10 Burp Extensions Every Pentester Should Use
Burp
2026-04-10 2026Burp AI in 2026: Real Workflow Changes
Library integrating AI into Burp Suite Professional (v2025.2+) for enhanced web security testing. Features include Burp AI in Repeater for auditable HTTP message analysis, Explainer for quick understanding of unfamiliar artifacts, and Explore Issue for automated follow-up on Burp Scanner findings. Usage is consumption-based via AI credits assigned per user, requiring careful management of prompts for cost-effectiveness and accurate validation of vulnerabilities.
Burp
2026-04-10 2026Burp Suite Professional 2026.1 Release
Library update introducing the Discover tab for feature exploration, command palette for faster table navigation, improved time-based SQL injection detection filtering WAF delays, and SPNEGO support for NTLM authentication. This release also includes a Java update to 25.0.1 and a browser upgrade to Chromium 143.
Burp
2026-04-10 2026Burp Suite Professional 2025.5 Release
Library release notes for Burp Suite Professional 2025.5 detailing new AI-powered custom actions in Repeater for context-aware HTTP message analysis, including a sample action to explain text and a template for testing race condition vulnerabilities. The release also incorporates Montoya API updates for direct extension settings integration, and quality-of-life improvements such as access to timing data for custom actions and faster body encoding switching.
Burp
2026-04-10 202610 Burp Suite Extensions That Will Instantly Boost Your Work
10 Burp Suite Extensions That Will Instantly Boost Your Work
Burp
2026-04-10 2026How Burp Suite DAST Is Leveling Up Enterprise Security in 2025
Tool updates to Burp Suite DAST in 2025 enhance enterprise security testing by automating scan scheduling for portfolios, organizing assets with custom tags, and improving API scanning with automatic token refreshes. It accelerates vulnerability detection by crawling and auditing SPAs in parallel and integrates seamlessly with Jira for streamlined remediation tracking, supporting parent-child issue hierarchies and automated ticket creation. New onboarding packages aim to shorten learning curves and ensure fast results.
Burp
2026-04-10 2026Burp Suite Professional 2025.2: Built-in AI Integration
Burp Suite Professional 2025.2: Built-in AI Integration
Burp
2026-04-10 2026PortSwigger Blind XXE Lab Write-up
PortSwigger Blind XXE Lab Write-up
XXE
2026-04-10 2026PortSwigger XXE Injection Writeups
Writeups detailing nine PortSwigger labs demonstrate exploitation of XML External Entity (XXE) vulnerabilities. Techniques covered include retrieving files from `/etc/passwd` and `/etc/hostname`, performing Server-Side Request Forgery (SSRF) to access EC2 metadata and obtain IAM credentials, bypassing security restrictions using XInclude and parameter entities, out-of-band data exfiltration via Burp Collaborator, and repurposing local DTDs to extract data through error messages. The labs also showcase exploiting XXE via image file uploads using SVG.
XXE
2026-04-10 2026Insecure Direct Object References (IDOR) | PortSwigger
Reference on Insecure Direct Object References (IDOR), an OWASP Top Ten vulnerability type where applications misuse user-supplied input to access objects directly. It details how attackers can exploit this, leading to horizontal or vertical privilege escalation by altering parameters to access other users' data, such as in database queries (e.g., `customer_account?customer_number=132355`) or static files (e.g., `/static/12144.txt`).
AuthZIDOR
2026-04-10 2026100+ Burp Suite Online Courses for 2026
100+ Burp Suite Online Courses for 2026
Burp
2026-04-10 2026Burp Suite AI Extension for Pentester
Burp Suite AI Extension for Pentester
Burp
2026-04-10 2026Burp Suite Goes AI: Revolutionizing Web Pentesting
Library integration of AI-powered extensions into Burp Suite Professional, developed by PortSwigger, automates web pentesting tasks. This update offers security professionals enhanced efficiency and deeper vulnerability insights, with features like custom tag generation in Hackvertor using natural language prompts. The integration aims to simplify AI model management and allows extensions to be shared via the BApp Store, including an initial offering of 10,000 free AI credits.
Burp
2026-04-10 2026Burp Suite Integration for Neuron
Library that streamlines the security testing workflow by integrating Burp Suite findings directly into the Neuron platform. The Neuron Burp Suite Extension allows testers to push identified issues from Burp, automatically creating structured findings within Neuron, complete with request/response evidence, linked to specific web applications and endpoints. This eliminates redundant work by enabling findings to be directly associated with defined web application assets, including hostnames, endpoints, parameters, and scope metadata, facilitating clearer reporting and a standardized system of record for web application security testing across teams.
Burp
2026-04-10 2026The Future of Pentesting: Burp Suite + Cursor AI
The Future of Pentesting: Burp Suite + Cursor AI
Burp
2026-04-10 2026SQL Injection Tutorial & Examples - PortSwigger
Tutorial on SQL injection covers its definition, methods for finding and exploiting vulnerabilities such as retrieving hidden data, subverting application logic with UNION attacks, and blind SQL injection. It details manual detection techniques like using single quotes, SQL syntax, boolean conditions, and time delays, and mentions Burp Scanner for automated detection. The resource also addresses injection in different parts of SQL queries, including WHERE, UPDATE, INSERT, SELECT, and ORDER BY clauses, and provides practical examples.
SQLi
2026-04-10 2026GraphQL API Vulnerabilities - PortSwigger
Library for testing GraphQL APIs, detailing common vulnerabilities like introspection enablement and insecure direct object references (IDORs). It covers techniques for discovering GraphQL endpoints, including universal queries and common endpoint names, and demonstrates how to exploit unsanitized arguments to access unauthorized data. The library also explains how to use introspection queries to gather schema information and identifies methods for probing and running full introspection queries against vulnerable endpoints.
GraphQL
2026-04-06 2026Toolchain: Nmap, Burp Suite, and Metasploit - A Practical Workflow Guide
Library for practical penetration testing workflows, integrating Nmap, Burp Suite, and Metasploit. Nmap maps the attack surface by identifying live hosts, open ports, service versions, and OS fingerprints. Burp Suite then tests web applications, intercepting and modifying HTTP requests to find vulnerabilities like SQL injection, XSS, and IDOR. Finally, Metasploit validates identified vulnerabilities, demonstrating exploitability and impact, leveraging modules for specific exploits and post-exploitation actions.
Burp
2026-04-06 2026Top 10 Burp Suite Extensions Every Pentester Should Use
Top 10 Burp Suite Extensions Every Pentester Should Use
Burp
2026-04-03 2026Lab: SameSite Lax Bypass via Cookie Refresh | PortSwigger
Lab demonstrating a CSRF attack to bypass SameSite cookie restrictions. This lab involves changing a victim's email address by exploiting a vulnerable account change function. The technique focuses on a SameSite Lax bypass via cookie refresh, requiring an attacker to circumvent browser popup blockers and induce user interaction to trigger the necessary OAuth flow and subsequent email modification.
CSRF
2026-04-03 2026Lab: SameSite Lax Bypass via Method Override | PortSwigger
Lab: SameSite Lax bypass via method override details a Cross-Site Request Forgery (CSRF) vulnerability within the "change email" function. The lab demonstrates how to bypass SameSite cookie restrictions, specifically the Lax default, by crafting a GET request that overrides the intended POST method using the `_method` parameter. The solution involves using an exploit server to trigger a top-level navigation that sends the malicious request, ultimately changing the victim's email address.
CSRF
2026-04-03 2026Installing Extensions from BApp Store | PortSwigger
Installing Extensions from BApp Store | PortSwigger
Burp
2026-04-03 20263 Powerful Burp Suite Extensions Every Pentester Should Use
3 Powerful Burp Suite Extensions Every Pentester Should Use
Burp
2026-04-03 2026BApp Store | PortSwigger
Library of Burp Suite extensions featuring tools for identifying and bypassing common web application vulnerabilities. This collection includes extensions for automating 403 bypasses, detecting SQL injection and XSS through AI analysis, fuzzing LLM prompts, scanning for AWS and cloud storage misconfigurations, and finding DOM-based vulnerabilities. Specific extensions like "Anonymous Cloud, Configuration and Subdomain Takeover Scanner" and "AI HTTP Analyzer" are detailed, alongside capabilities for AES payload manipulation and CSP header analysis.
Burp
2026-04-03 2026Burp Suite Professional BApps: Maximizing Pentester Productivity
Library of Burp Suite Professional BApps that enhance pentester productivity by automating workflows, accelerating discovery, and reducing manual effort. These extensions integrate into Burp Suite Professional to customize capabilities, standardize penetration testing workflows, reduce tool fragmentation, increase analyst efficiency, improve consistency across engagements, and enhance the scalability of security operations. BApps allow for a balance between customization and centralized control, leading to measurable productivity improvements and supporting operational maturity by automating discovery and reducing manual workloads.
Burp
2026-04-03 2026Burp Bounty - Scan Check Builder Extension
Library for improving Burp Suite's active and passive scanners via personalized rules. It features an intuitive graphical interface for advanced pattern searching and payload enhancement, enabling users to create custom issue profiles. This extension supports the creation of unique scanning rules and integrates with Burp Collaborator for tasks like Blind RCE detection.
Burp
2026-04-03 2026Burp Suite - Top Extensions | KSEC ARK Pentesting Knowledge Base
Library of Burp Suite extensions includes tools for detecting vulnerable JavaScript libraries with Retire.js, identifying authorization flaws via Autorize, testing JOSE/JWE with JOSEPH, logging requests/responses with Logger++, and enhancing active scanning with ActiveScan++. Specific vulnerabilities mentioned include Drupalgeddon (CVE-2014-3704), Joomla SQL injection (CVE-2017-8917), WordPress SQL injection in plugins, CSRF, and numerous SSL vulnerabilities such as Heartbleed and POODLE.
Burp
2026-04-03 2026Top 10 Must-Have Burp Suite Extensions for Web Application Security (2024)
Top 10 Must-Have Burp Suite Extensions for Web Application Security (2024)
Burp
2026-04-03 2026Top 10 Pentesting Tools and Extensions in Burp Suite | PortSwigger
Library of 10 Burp Suite extensions designed to enhance penetration testing workflows, including Logger++, Autorize, Turbo Intruder, J2EEScan, Backslash Powered Scanner, Upload Scanner, Retire.js, JSON Beautifier, AuthMatrix, and Param Miner. These tools automate tasks like access control testing, bruteforcing, vulnerability detection for J2EE applications, file upload analysis, identifying outdated JavaScript libraries, JSON formatting, privilege escalation testing, and discovering hidden parameters for cache poisoning attacks.
Burp
2026-04-03 2026Top 20 Useful Burp Suite Extensions for Web Application Pentesting
Library of 20 Burp Suite extensions enhances web application penetration testing by automating tasks and discovering vulnerabilities. These tools include Param Miner for hidden parameter discovery, JS Miner for JavaScript analysis, Secret Finder for detecting exposed secrets, and 403 Bypasser for access control evasion. They also cover authorization testing with Autorize, out-of-band detection via Collaborator Everywhere, high-speed brute-forcing with Turbo Intruder, and API assessment with GraphQL Raider. Other notable extensions address JWT analysis, Java deserialization flaws, and vulnerable JavaScript library detection with Retire.js.
Burp
2026-04-03 2026Cross-Site Scripting (XSS) Cheat Sheet - 2026 Edition | PortSwigger
Cheatsheet detailing Cross-Site Scripting (XSS) vectors, regularly updated and featuring bypass techniques for WAFs and filters. It categorizes vectors by event handlers, tags, and browser compatibility, including proof-of-concept code for numerous scenarios such as JavaScript hoisting, file upload restrictions, and bypassing specific browser limitations with techniques like exception handling and template strings.
XSS
2026-04-03 2026Access Control Vulnerabilities and Privilege Escalation | PortSwigger
Reference detailing access control vulnerabilities and privilege escalation, explaining vertical and horizontal controls, context-dependent mechanisms, and common vulnerabilities such as unprotected functionality, parameter-based bypasses, and platform misconfigurations involving headers like `X-Original-URL` and `X-Rewrite-URL`. It also covers URL-matching discrepancies, including case insensitivity and the `useSuffixPatternMatch` option in Spring.
AuthZ
2026-04-03 2026Lab: Exploiting Ruby Deserialization Using a Documented Gadget Chain | PortSwigger
Library for exploiting Ruby deserialization vulnerabilities, specifically in Ruby on Rails applications. This resource details a lab environment where a documented gadget chain can be adapted to achieve remote code execution. The objective involves creating a malicious serialized object containing an RCE payload to delete a target file, leveraging a serialization-based session mechanism.
Deser
2026-04-03 2026Exploiting Insecure Deserialization Vulnerabilities | PortSwigger
Library for exploiting insecure deserialization vulnerabilities in PHP, Ruby, and Java. It covers identifying serialized data, modifying object attributes and data types for attacks, and chaining method invocations. The resource demonstrates how to exploit PHP's `serialize()`/`unserialize()` and Java's `java.io.Serializable` interface, including scenarios involving type juggling with PHP's loose comparison operator.
Deser
2026-04-03 2026API Testing with Burp Suite: A Practical Guide
Library for intercepting, modifying, and analyzing API traffic with Burp Suite, detailing techniques for REST APIs like parameter tampering and SQL injection detection in Repeater, and for GraphQL APIs, including schema introspection queries and modifying requests via dedicated GraphQL tabs. The library also highlights Burp Intruder for fuzzing and Pynt as an alternative tool.
API Sec
2026-04-02 2026Network Penetration Testing Tools Market Is Going to Boom |? Nessus ? Burp Suite ? Metasploit
Network Penetration Testing Tools Market Is Going to Boom |? Nessus ? Burp Suite ? Metasploit https://ift.tt/fCDeuAg
Burp
2026-02-11 2026SILENTCHAIN AI - AI-Powered Security Testing
Library for AI-powered offensive security, covering web applications, source code, and network infrastructure. Features include OWASP Top 10 detection via a Burp Suite extension, standalone web application scanning with CI/CD integration, and AI-powered static code analysis with PoC generation. It integrates with five AI providers, including local Ollama support, and utilizes a RAG Knowledge Engine with over 80,000 security documents. Products offer cross-product correlation for finding escalation, WAF detection and evasion for 25+ types, and out-of-band testing for XSS, SSRF, and XXE.
AIBurp
2026-01-29 2026How I Made Burp Suite My IDOR-Finding Robot Butler (And Found 20+ Bugs) 🤖🔍
The content titled "How I Made Burp Suite My IDOR-Finding Robot Butler (And Found 20+ Bugs)" likely discusses utilizing the Burp Suite tool to automate the discovery of Insecure Direct Object Reference (IDOR) vulnerabilities, leading to the identification of over 20 bugs. The author shares their experience and strategies for leveraging Burp Suite effectively in bug hunting. The content may provide insights into the process of using automation tools for security testing and the successful outcomes achieved through this approach.
Bug BountyBurpIDOR
2026-01-26 2026WebHackDiaries Part 4: SSRF Just completed the SSRF labs on PortSwigger Web Security Academy. Key lesson: SSRF isnt about URLs its about broken trust boundaries. On to the next labs #WebHackDiaries #SSRF #PortSwigger #WebSecurity #BugBounty #CyberSecuripic.x.com/RgANMeoaW2aW2
The content discusses completing SSRF labs on PortSwigger Web Security Academy, emphasizing that SSRF is about broken trust boundaries, not just URLs. The focus is on learning and moving on to the next labs. Key hashtags include #WebHackDiaries, #SSRF, #PortSwigger, #WebSecurity, #BugBounty, and #CyberSecuri. The post includes a link to a picture.
SSRF
2026-01-24 2026Burp Suite | Pentest Book
Burp Suite | Pentest Book
Burp
2026-01-22 2026Testing for reflected XSS manually with Burp Suite
Library for testing reflected XSS with Burp Suite's Repeater. This method involves identifying HTTP requests that reflect user input and then manipulating those requests to inject proof-of-concept XSS payloads. The technique focuses on input validation and server-side sanitization, utilizing Burp Repeater to directly modify requests and observe the immediate response for successful payload execution within HTML contexts, such as the example `alert()` function.
XSS
2026-01-21 2026Testing for stored XSS with Burp Suite
Library for manually testing stored XSS vulnerabilities using Burp Suite. It details identifying input and output points by submitting unique values and filtering HTTP history, then using Repeater to send proof-of-concept payloads like `<script>alert(1)</script>` to test for execution.
XSS
2026-01-20 2026MantisSTS/JSReconduit: Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.
Library bridging Burp Suite traffic into VSCode for passive JavaScript reconnaissance. It captures JavaScript assets via a Burp Suite extension and performs Abstract Syntax Tree (AST) analysis within VSCode, rendering findings like API endpoints, routes, drift detection, clusters, dataflow traces, and secrets. The tool supports source-to-sink tracing, lazy chunk extraction, optional deobfuscation, and various export formats including JSON, CSV, and SARIF. Custom signature packs can be integrated for enhanced detection.
BurpRecon
2026-01-19 2026Testing for SSRF with Burp Suite
Walkthrough of testing for Server-Side Request Forgery (SSRF) using Burp Suite's Intruder. This method focuses on identifying attack vectors containing URLs, then leveraging Intruder to enumerate internal IP addresses, particularly within private ranges like `192.168.0.0/24`. The process involves modifying requests, setting up numerical payloads to probe different IP octets and ports, and analyzing response status codes and lengths to detect internal back-end systems.
SSRF
2026-01-18 2026Testing for blind SSRF with Burp Suite
Library for detecting blind SSRF vulnerabilities using Burp Suite's Collaborator. It details a workflow for identifying these flaws by injecting a Collaborator payload into HTTP requests, typically within a parameter like `productId` or a header such as `Referer`. The library guides users to monitor Collaborator interactions for out-of-band requests, confirming the SSRF vulnerability.
SSRF
2026-01-16 2026Included Skills: 𝐛𝐮𝐫𝐩𝐬𝐮𝐢𝐭𝐞-𝐩𝐫𝐨𝐣𝐞𝐜𝐭-𝐩𝐚𝐫𝐬𝐞𝐫 - Search/extract data from Burp Suite projects 𝐝𝐢𝐟𝐟𝐞𝐫𝐞𝐧𝐭𝐢𝐚𝐥-𝐫𝐞𝐯𝐢𝐞𝐰 - Security-focused differential review of code changes
The content discusses two included skills: searching/extracting data from Burp Suite projects and conducting a security-focused differential review of code changes. These skills are valuable for individuals involved in cybersecurity or software development. The link provided likely offers more detailed information on these skills.
Burp
2026-01-02 2026repplus/rep: rep+ — Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks
Library: rep+ is a Chrome DevTools extension mimicking Burp's Repeater, enhanced with AI. It captures and replays HTTP requests without proxy setup, offering features like multi-tab capture, hierarchical grouping, and robust filtering. Built-in AI can explain requests, suggest attack vectors, and modify requests directly. It supports detailed secret and endpoint extraction, parameter risk assessment, and generates Postman collections. rep+ integrates with Claude, Gemini, and Ollama, featuring a chat interface for contextual analysis across multiple requests, and offers extensive theming options.
Burp
2025-12-30 2025Teycir/BurpAPISecuritySuite: Burp Suite extension for API security testing with 15 attack types, 108+ payloads, intelligent fuzzing, BOLA/IDOR detection, AI integration, and automated reconnaissance. Supports REST/GraphQL/SOAP APIs with Nuclei, Turbo Intruder, and external tool integration. OWASP API Top 10 coverage.
Library for comprehensive API security testing within Burp Suite. It consolidates 15 attack types, including BOLA, IDOR, SQLi, and GraphQL specific vulnerabilities, leveraging over 108 payloads and intelligent fuzzing. Features include automated reconnaissance, smart normalization of API endpoints, AI integration for payload generation, and seamless integration with external tools like Nuclei, Turbo Intruder, HTTPX, and SQLMap. It covers the OWASP API Top 10 and offers differential-first logic coverage and token lifecycle drift analysis.
API SecBurpFuzzingGraphQL
2025-12-12 2025I completed the @WebSecAcademy lab: Blind SSRF with Shellshock exploitation my first Expert-level lab! Huge thanks to @PortSwigger this one was intense and super fun. #BugBounty #SSRF #securitymindset portswigger.net/web-security/sGpic.x.com/coygKcXqSrSr
The content highlights the completion of an Expert-level lab on Blind SSRF with Shellshock exploitation by @WebSecAcademy. The individual expresses gratitude to @PortSwigger for the intense and enjoyable experience. The post includes hashtags #BugBounty, #SSRF, and #securitymindset. The link provided leads to web-security information.
SSRF
2025-12-09 2025Day 20/30 SSRF forged on @PortSwigger! Scanned internals bypassed blacklists blind exfil 2 labs owned including OOB chains. Takeaway: Never trust user-supplied URLs without validation! #SSRF #WebSecurity #PortSwiggerAcademy #BugBounty #EthicalHacking @ethivolt pic.x.com/VKIxogbRG0
Day 20/30 of SSRF testing on @PortSwigger resulted in bypassing blacklists, blind exfiltration, and owning 2 labs with OOB chains. Key takeaway: Always validate user-supplied URLs to prevent SSRF attacks. #SSRF #WebSecurity #PortSwiggerAcademy #BugBounty #EthicalHacking @ethivolt.
SSRF
2025-11-04 2025DAY 3-5/30 Deep-dive on SSRF research to strengthen real-world exploitation skills Completed 2/18 SQLi labs on @PortSwigger #BugBounty #SSRF #SQLi #WebSecurity #Infosec
The content highlights progress made on days 3-5 of a 30-day deep dive into SSRF research to enhance real-world exploitation skills. It mentions completing SQL injection labs on @PortSwigger on February 18. The focus is on bug bounty, SSRF, SQLi, web security, and infosec. The post indicates active engagement in cybersecurity research and skill development in the context of bug bounty programs.
SSRF
2025-11-03 2025Completed my first basic SSRF lab on #PortSwigger today. Used an #SSRF to make the server request http://localhost which let me reach the internal /admin #endpoint and delete a user without admin #credentials. #hacking #security
The content describes completing a basic SSRF lab on PortSwigger, utilizing SSRF to send a server request to http://localhost, accessing the internal /admin endpoint, and deleting a user without admin credentials. The post highlights the hacking and security aspects of this exercise.
SSRF
2025-11-03 2025Completed my first basic SSRF lab on #PortSwigger today. Used an #SSRF to make the server request http://localhost which let me reach the internal /admin #endpoint and delete a user without admin #credentials. #hacking #security
The content discusses completing a basic SSRF lab on PortSwigger by using SSRF to send a server request to http://localhost, accessing the internal /admin endpoint, and deleting a user without admin credentials. This demonstrates a security vulnerability that could be exploited for unauthorized actions. The post highlights the importance of understanding and securing against SSRF attacks in the context of hacking and security.
SSRF
2025-10-30 2025DAY 1/30 - SSRF learning path completed on @PortSwigger Web Security Academy. #SSRF #WebSecurity
The user completed the SSRF learning path on PortSwigger Web Security Academy on the first day of a 30-day challenge. The achievement was shared on social media with hashtags #SSRF and #WebSecurity.
SSRF
2025-09-23 2025Server leaking secrets? Thats SSRF! Conquered Intro to SSRF on @TryHackMe. Tips: 1) Tweak URL params (e.g. 127.0.0.1) for recon. 2) Use Burp Collaborator for blind SSRF. 3) Whitelist URLs. Whos next? #CyberSec #SSRF #TryHackMe
The content discusses Server-Side Request Forgery (SSRF) vulnerabilities and provides tips for exploiting them, such as manipulating URL parameters for reconnaissance, utilizing Burp Collaborator for blind SSRF attacks, and whitelisting URLs for protection. The author shares their success in mastering an "Intro to SSRF" challenge on TryHackMe and encourages others to try it. The post is tagged with #CyberSec, #SSRF, and #TryHackMe.
SSRF
2025-08-28 2025SSRF Tip: Test with payloads like or AWS . Use DNS loggers (Burp Collaborator) for blind SSRF. Prevention: whitelist domains #SSRF #BugBounty #WebSecurity #EthicalHacking
The content provides a tip for testing SSRF vulnerabilities using payloads like `http://169.254.169.254` or AWS. It suggests using DNS loggers like Burp Collaborator for blind SSRF testing. Prevention advice includes whitelisting domains. The post is related to SSRF, Bug Bounty, Web Security, and Ethical Hacking, emphasizing the importance of testing and securing against SSRF vulnerabilities.
SSRF
2025-08-14 2025Crushing bugs one lab at a time! Another PortSwigger Web Security Academy challenge SSRF with Whitelist-Based Input Filter. #CyberSecurity #PortSwigger #SSRF #WebSecurity #BugBounty #TechandAction #TechInAction
The content highlights a cybersecurity challenge from PortSwigger Web Security Academy focusing on SSRF with a Whitelist-Based Input Filter. The post emphasizes bug crushing in labs, showcasing a hands-on approach to cybersecurity. It also includes relevant hashtags like #CyberSecurity, #PortSwigger, #SSRF, #WebSecurity, #BugBounty, #TechandAction, and #TechInAction. The challenge aims to enhance skills in identifying and mitigating security vulnerabilities.
SSRF
2025-08-14 2025GitHub - asciimoo/wuzz: Interactive cli tool for HTTP inspection
Tool for interactive HTTP inspection. Wuzz mimics cURL's command-line arguments, enabling inspection and modification of requests copied from browser network inspectors. It supports regular expression filtering of response bodies by default, with a toggleable custom query syntax for formats like tests, and offers features such as better navigation and autocompletion. Installation is available via go get, binary releases, or package managers like apt and apk.
2025-08-14 2025(186) @Jhaddix Talks About Defcon, Burp Suite, Hacking, Bug Bounties and Ho
The content discusses @Jhaddix's insights on Defcon, Burp Suite, hacking, bug bounties, and more in a concise manner. It likely covers topics related to cybersecurity, ethical hacking, and bug bounty programs. The content may provide valuable information and perspectives on these subjects from @Jhaddix's expertise.
Talks
2025-08-14 2025Top 10 web hacking techniques of 2022 | PortSwigger Research
Survey of the top 10 web hacking techniques from 2022, highlighting vulnerabilities like request smuggling, client-side path traversal, and Psychic Signatures in Java. The research also covers exploiting Web3's hidden attack surface with XSS and SSRF, bypassing .NET Serialization Binders, and insecure SAML implementations leading to bytecode execution. Practical client-side path-traversal attacks are identified, alongside cache poisoning on Akamai Edge Nodes and Zimbra Email credential theft via Memcache injection. Browser-powered desync attacks and account hijacking through OAuth dirty dancing are also detailed.
Bug Bounty
2025-08-14 2025d0ge/sign-saboteur: SignSaboteur is a Burp Suite extension for editing, sig
Library for editing, signing, verifying, and attacking signed tokens within Burp Suite. It supports numerous token types including Django, ItsDangerous, Express, OAuth2 Proxy, Tornado, Ruby Rails, Nimbus JOSE + JWT, and unknown signed strings. Features include automatic detection and in-line editing, signing, and brute-force attacks against signed token implementations, with modes for known keys, fast, balanced, and deep attacks, alongside authorization attacks like user claims and wrapped user claims.
Burp
2025-08-14 2025254Labs/awesome-bambdas: A collection of Burp Suite Lambda Filters ~ Bambda
Library of Bambdas (Burp Suite's Lambdas) that customize Burp Suite's workflow. This collection, housed in the 254Labs/awesome-bambdas GitHub repository, categorizes filters by request or response object methods. Users can switch to Bambda mode in the HTTP Proxy history's "Configure filter" menu, then copy or download a bambda to the editor. Contributions are welcomed via pull requests.
Burp
2025-08-14 2025Burp Extension Dev Part 4: GUI Design - TCM Security
Library for developing Burp Suite extensions, focusing on GUI design. This resource details how to create user interfaces for custom tools within Burp Suite, enabling security professionals to build more effective and integrated application security testing workflows.
Burp
2025-08-14 2025GitHub - federicodotta/Burp-Suite-Extender-Montoya-Course: This repository
Library containing Burp Suite extension examples built with the Montoya API. This resource offers practical code for creating plugins that inspect and modify HTTP/WebSocket traffic, add custom context menu items, and integrate active/passive scanner checks, including BChecks and custom scan checks. It covers environment setup, basic extension development, and advanced features like Collaborator integration.
Burp
2025-08-14 2025GitHub - dwisiswant0/ngocok: ngrok Collaborator Link — yet another Burp Col
Library for intercepting out-of-band requests, serving as an alternative to Burp Collaborator by leveraging ngrok. It allows users to establish ngrok tunnels for capturing HTTP or TCP requests, with authentication managed via an authtoken flag, NGROK_AUTHTOKEN environment variable, or the ngrok configuration file. Ngocok can also log incoming requests to a specified file.
Burp
2025-08-14 2025Burp Extension Dev Part 1: Setup & Basics - TCM Security
Library for developing Burp extensions, this guide focuses on setup and basic functionalities, aiming to equip users with practical skills for uncovering vulnerabilities like injection flaws and broken access controls within web applications, ultimately strengthening security posture.
Burp
2025-08-14 2025Writing Burp Bambda Filters Like a Boss
Library for creating custom Burp Suite Proxy HTTP history filters using Java snippets. This feature, named "Bambdas," allows for advanced filtering beyond standard options, such as identifying specific JWT algorithms like HS512 within Authorization headers. Users can write and save these filters via the UI, leveraging interfaces like `ProxyHttpRequestResponse` and `Utilities` for complex request analysis.
Burp
2025-08-14 2025synfron/ReshaperForBurp
Extension for Burp Suite that allows triggering actions and reshaping HTTP request/response and WebSocket traffic via configurable Rules. These Rules process messages based on criteria like content type, event direction, source tool, scope, and text matches, executing actions such as building HTTP messages, dropping connections, extracting values, logging, prompting, running scripts, saving files, and setting variables. It supports sharing values across rules and can be built and run within IntelliJ for debugging.
Burp
2025-08-14 2025Improve your API Security Testing with Burp BCheck Scripts
Library for Burp Suite Professional that enables API security testing automation through BCheck scripts. These scripts, written in BSL, allow automated requests, response validation, Collaborator interaction, and programmatic payload injection. The library simplifies creating custom checks, like detecting missing Authorization headers (CWE-864), by integrating with Burp's scanner engine, thus accelerating manual testing workflows and improving efficiency.
Burp
2025-08-14 2025DNS Analyzer - Finding DNS vulnerabilities with Burp Suite - SEC Consult
Burp extension for discovering DNS vulnerabilities in web applications, leveraging Burp Collaborator to analyze DNS name resolution. The tool helps identify predictable UDP source ports and DNS IDs, key indicators for Kaminsky-style DNS cache poisoning attacks. Users generate a unique collaborator domain, trigger DNS resolutions (e.g., via user registration or password reset), and analyze interaction data through scatter plots and statistical metrics like standard deviation and direction bias to assess the predictability of DNS query parameters.
Burp
2025-08-14 20257 Essential Burp Extensions for Hacking APIs - Security Boulevard
Extensions for Burp Suite that enhance API security testing, including Logger++ for advanced log filtering and analysis, OpenAPI Parser for generating baseline requests from documentation, Param Miner for discovering hidden parameters, Autorize for detecting authorization flaws like BOLA/IDOR, JOSEPH for tampering with JWTs, Content Type Converter for format manipulation to find XXE and other vulnerabilities, and Attack Surface Detector for mapping risk levels.
Burp
2025-08-14 2025Burp Suite: The Basics TryHackMe Writeup
The content is about a writeup on using Burp Suite for basic tasks on TryHackMe. Burp Suite is a popular web application testing tool used for security assessments. The writeup likely covers introductory information, tutorials, and practical exercises related to using Burp Suite in a simulated hacking environment provided by TryHackMe. This content is likely to provide insights into how to use Burp Suite effectively for testing and securing web applications.
Burp
2025-08-14 2025https://github.com/lucsemassa/burp_bug_finder
Library for automated web vulnerability discovery within Burp Suite. This Python-based plugin focuses on identifying XSS and error-based SQL injection vulnerabilities. It automatically injects payloads into intercepted requests, including parameters and cookies, and analyzes responses for malicious patterns or SQL error messages. Users can configure targets via the scope and receive alerts in the Burp Suite dashboard for identified issues. Installation requires Jython.
Burp
2025-08-14 2025Vulnerabilities detected by Burp Scanner - PortSwigger
The content provided is a title mentioning vulnerabilities detected by Burp Scanner, a web vulnerability scanner developed by PortSwigger. It suggests that the focus is on identifying security weaknesses in web applications through the use of this tool. The summary lacks detailed information about specific vulnerabilities or how they are detected, but it highlights the importance of using tools like Burp Scanner to enhance the security of web applications.
Burp
2025-08-14 2025botesjuan/Burp-Suite-Certified-Practitioner-Exam-Study
The content appears to be a study guide or resource related to preparing for the Burp Suite Certified Practitioner Exam. It seems to be created by a user named botesjuan. The content likely includes information, tips, and resources to help individuals study and prepare for the certification exam.
Burp
2025-08-14 2025xnl-h4ck3r/GAP-Burp-Extension
Extension for Burp Suite that identifies additional potential parameters, links for testing, and generates target-specific wordlists for fuzzing. It enhances the original `getAllParams` extension by supporting various parameter types like XML and GraphQL, and offers modes for finding parameters, words, and improved link discovery. Installation involves setting up Jython, installing required modules via `pip`, and loading the `GAP.py` script within Burp.
Burp
2025-08-14 2025nccgroup/AutoRepeater: Automated HTTP Request Repeating With Burp Suite
Library for Burp Suite that automates HTTP request repeating, streamlining authorization testing. It allows researchers to duplicate, modify, and resend requests with conditional replacements for headers, cookies, and parameters. Unlike AuthMatrix, Authz, and Autorize, AutoRepeater offers general-purpose replacements and a familiar interface, facilitating testing for issues like account takeover or privilege escalation by automatically evaluating response differences.
Burp
2025-08-14 2025My First Burp Suite Extension
Library for developing custom Burp Suite extensions in Java. This project details the creation of a simple extension that checks for specific HTTP response headers, demonstrating how to set up the development environment, implement `IBurpExtender` and `IScannerCheck` interfaces, and define custom `IScanIssue` objects for reporting findings. The code is available on GitHub.
Burp
2025-08-14 2025The Top 8 Burp Suite Extensions - Think outside the box
The content briefly mentions the top 8 Burp Suite extensions, encouraging users to think creatively and explore beyond the standard features of the tool. It suggests that by utilizing these extensions, users can enhance their security testing capabilities and discover new ways to improve their testing processes. The emphasis is on expanding one's toolkit and considering innovative approaches to maximize the benefits of using Burp Suite.
Burp
2025-08-14 2025Open Security Research: Extending Burp Proxy With Extensions
The content discusses open security research focused on extending Burp Proxy with extensions. It likely explores the development and implementation of additional functionalities or features within Burp Proxy to enhance its capabilities for security testing and analysis. The article may delve into the benefits, methods, and potential outcomes of extending Burp Proxy through the use of extensions, aiming to provide insights and guidance for security researchers and professionals seeking to optimize their security testing tools.
Burp
2025-08-14 2025PortSwigger Web Security Blog: Writing your first Burp Suite extension
Library for writing Burp Suite extensions, detailing the creation of both Java and Python plugins. It guides users through setting up an IDE, exporting Burp's Extender interface files, writing basic `BurpExtender` code, compiling Java JARs, and configuring Jython for Python extensions. The entry also notes potential `OutOfMemoryError` issues with Python extensions and suggests solutions.
Burp
2025-08-14 2025Web App Pentesting With Burp Suite Scan Profiles | White Oak
Guide to optimizing Burp Suite scan profiles for web application penetration testing. It details how to configure profiles to enhance efficiency and effectiveness during security assessments, ensuring comprehensive coverage of potential vulnerabilities.
Burp
2025-08-14 2025https://portswigger.net/blog/some-of-the-best-burp-extensions-as-chosen-by-you
Extensions from the Burp Suite BApp Store are highlighted, including Autorize for testing authentication vulnerabilities, Turbo Intruder for high-speed automated attacks, Hackvertor for tag-based encoding and escaping, Burp Bounty for custom scan checks, and Param Miner for identifying hidden parameters to hunt for web cache poisoning.
Burp
2025-08-14 2025Great getting started resources for new users of Burp Suite Professional |
Library of resources for new Burp Suite Professional users, including video tutorials on UI basics and Scanner setup, blog posts detailing exclusive features like Intruder and Collaborator client, and the free Web Security Academy with learning paths on SQL injection and other topics. Community content from creators like InsiderPhD, webpwnized, and STÖK showcases practical applications, alongside the BApp Store for extensions and Extender documentation for custom development.
Burp
2025-08-14 2025https://www.whiteoaksecurity.com/web-app-pentesting-burp-suite-scan-profile/
Profile for Burp Suite web application penetration testing, detailing how to configure scans to effectively identify vulnerabilities. This profile emphasizes a security-led approach, offering comprehensive IT services, penetration testing, and risk management solutions. It guides companies from initial assessment and practical implementation to ongoing support and strategic security elevation, advising on regulatory compliance standards.
Burp
2025-08-14 2025Authentication Token Obtain and Replace (ATOR) Burp Plugin: Fast and Reliab
The content is about the Authentication Token Obtain and Replace (ATOR) Burp Plugin, which is described as fast and reliable. It likely focuses on a tool or extension that aids in obtaining and replacing authentication tokens within the Burp Suite software. The plugin is designed to streamline the process of managing authentication tokens, enhancing efficiency and reliability in security testing and web application assessments.
Burp
2025-08-14 2025BurpSuite Extensions: Some Favorites - VDA Labs
Library of Burp Suite extensions offering enhanced application security testing. Features include Taborator for out-of-band interactions, beautifiers for response readability, Active Scan++ and Additional Scanner Checks for broader issue detection, Freddy for deserialization vulnerabilities, HTML5 Auditor, CSP-Bypass for header analysis, AWS Security Checks, Retire.js for outdated JavaScript, SSL Scanner for TLS assessment, J2EEScan for J2EE vulnerabilities (including CVE-2010-1871, CVE-2011-2730, and S2-016), Error Message Checks, Software Vulnerability Scanner using Vulners.com API, CSRF Scanner, Collaborator Everywhere for backend interaction discovery, and Upload Scanner for file upload bypasses.
Burp
2025-08-14 2025Burp Share Requests - PortSwigger
Extension for Burp Suite that generates shareable links to specific HTTP requests. Users can right-click requests in various Burp tabs and select "create link" to add them to the "Burp Share Requests" tab. From there, HTML or direct browser links can be generated for easy sharing with other Burp Suite users, streamlining collaboration and analysis of captured traffic.
Burp
2025-08-14 2025https://www.infosecurity-magazine.com/news/portswigger-launches-web-security/
Academy providing free, interactive labs and reading materials for web security training. Developed by PortSwigger, makers of Burp Suite, it addresses the global cybersecurity talent shortage. The platform offers continuously updated content on topics like clickjacking, WebSocket, HTTP request smuggling, server-side request forgery, and XXE injection, in a safe, risk-free testing environment. Users can track progress and compete on leaderboards.
Burp
2025-08-14 2025https://github.com/snoopysecurity/awesome-burp-extensions
Library of curated Burp extensions enhancing security testing capabilities. This extensive list includes tools for passive and active scanning, such as ActiveScan++, Burp Vulners Scanner, and J2EEScan. It also features extensions for specific vulnerabilities like CSRF, HTML5 security risks, Java deserialization, and Log4Shell (CVE-2021-44228), alongside utilities for Content Security Policy bypass, HTTP request smuggling, and GraphQL security testing with InQL Scanner. Extensions are categorized for easy navigation, covering areas like Cloud Security, OAuth, Information Gathering, and Web Application Firewall Evasion.
Burp
2025-08-14 2025Using Burp to Test a REST API | Burp Suite Support Center
Guide to testing REST APIs using Burp Suite, demonstrating how to identify API endpoints and map the attack surface by proxying traffic and analyzing JSON or XML responses. The guide details using the Repeater tab to identify vulnerable parameters, such as those susceptible to arithmetic evaluation, and then performing SQL injection attacks by crafting specific SQL syntax to verify vulnerabilities.
Burp
2025-08-14 2025https://www.kitploit.com/2018/11/aes-killer-v30-burp-plugin-to-decrypt.html?utm_source=dlvr.it&utm_medium=twitter&m=1
The content discusses AES Killer v3.0, a Burp Suite plugin designed to decrypt AES encrypted traffic in real-time. It allows security professionals to analyze encrypted traffic and identify potential vulnerabilities. The plugin can be used to decrypt HTTPS traffic and view the plaintext data for security testing purposes. This tool enhances the capabilities of Burp Suite for security researchers and penetration testers.
Burp
2025-08-14 2025PortSwigger/param-miner
Extension that identifies hidden, unlinked parameters, significantly aiding in the discovery of web cache poisoning vulnerabilities. Param Miner employs advanced diffing logic and a binary search technique to probe up to 65,000 parameter names per request, drawing from both a built-in wordlist and harvested terms from in-scope traffic. It integrates seamlessly with Burp Suite, reporting findings as scanner issues in Pro versions or listing them under the Extender tab, and supports scalable multi-request attacks and auto-mining of traffic.
Burp
2025-08-14 2025GitHub - nccgroup/BurpSuiteHTTPSmuggler: A Burp Suite extension to help pen
Extension for Burp Suite designed to assist pentesters in bypassing Web Application Firewalls (WAFs) or assessing their efficacy through various HTTP request encoding techniques. Developed by NCC Group, its initial release (v0.1) focuses on the complex task of encoding, with future versions planned to incorporate additional bypass methods.
Burp
2025-08-14 2025The Top 5 Burp Suite Extensions
Library of Burp Suite extensions enhancing penetration testing capabilities. This collection highlights tools like XSS Validator for accurate vulnerability identification, Burp Notes for organized documentation, Sentinel as a free alternative scanner, Random IP Address Header to bypass WAFs, and Bupy/Python Scripter for custom script development, ultimately boosting researcher productivity and profitability.
Burp
2025-08-14 2025SleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Po
SleuthQL is a Burp Suite tool designed for parsing history to uncover potential SQL injection vulnerabilities. It aids in identifying security flaws related to SQL injection by analyzing Burp's history.
Burp
2025-08-14 2025https://portswigger.net/web-security/sql-injection/cheat-sheet
Cheatsheet of SQL injection syntax for common attack tasks, including string concatenation, substring extraction, query truncation with comments, database version and content enumeration, conditional errors, batched queries, time delays, DNS lookups, and DNS lookup with data exfiltration, useful for formulating complex attacks and exfiltrating sensitive information.
SQLi
2025-08-14 2025https://www.hackingarticles.in/burp-suite-for-pentester-hackbar/
Library for Burp Suite that accelerates manual penetration testing by automating payload insertion for various vulnerabilities. HackBar offers dropdown lists with pre-defined payloads for SQL Injection, Cross-Site Scripting, Local File Inclusion, XXE Injection, and OS Command Injection, streamlining the process of testing and exploiting these common web application flaws.
BurpXSSXXE
2025-08-14 2025https://portswigger.net/web-security/xxe
Library detailing XML external entity (XXE) injection, a web security vulnerability allowing attackers to interfere with XML data processing. It covers exploiting XXE to retrieve files, perform server-side request forgery (SSRF), and exfiltrate data via blind XXE techniques. The library also discusses XInclude attacks and XXE vulnerabilities in file uploads, specifically mentioning SVG format.
XXE
2025-08-14 2025br3akp0int/GQLParser: A repository for GraphQL Extension for Burp Suite
Extension for Burp Suite that automatically detects and parses GraphQL requests, presenting dynamic user input parameters in a structured format for easier payload injection. This tool simplifies the process of tampering with GraphQL queries by allowing testers to edit queries directly within Burp Suite and send them to Repeater for further analysis and vulnerability testing. It aims to integrate with Burp's Scanner to facilitate integer scanning and optimize the scanner for reduced bad requests, with ongoing development for core GraphQL vulnerability scanning.
GraphQL
2025-08-14 2025https://portswigger.net/research/our-favourite-community-contributions-to-the-xss-cheat-sheet
Reference highlights seven community contributions to the XSS cheat sheet, including @hahwul's missing pointer events, @p4fg's Vue `v-if` vector, @NotSoSecure's AngularJS restriction bypass, @kachakil's AngularJS fix, @davwwwx's attribute injection, @laytonctf's `onbeforeinput` event, and @ladecruze's top-ranked payload using `location`, `atob`, and tagged template strings, with variants utilizing `unescape` and `String.fromCodePoint`.
XSS
2025-08-14 2025Documenting the impossible: Unexploitable XSS labs | PortSwigger Research
Labs detailing unexploitable XSS scenarios, including challenges like unclosed tag bypasses, JavaScript variable injections with escaped characters, query string processing with `innerHTML`, attribute length limitations, frameset injections, and minimal arbitrary code execution via `alert()`. These labs, presented as challenges on the PortSwigger XSS cheat sheet, aim to solidify understanding when exploitation proves difficult, offering confidence that a vulnerability may indeed be unexploitable if matching these specific, tricky conditions.
XSS
2025-08-14 2025(509) Find and Exploit Server-Side Request Forgery (SSRF) Using Burp Suite
The content is about utilizing Burp Suite to discover and exploit Server-Side Request Forgery (SSRF) vulnerabilities. SSRF allows attackers to make requests on behalf of the server, potentially accessing sensitive data or services. Burp Suite, a popular web vulnerability scanner, can help identify SSRF vulnerabilities in web applications, enabling security professionals to address and mitigate these risks. By understanding how SSRF works and using tools like Burp Suite, security experts can enhance the protection of web applications against potential exploits.
SSRF
2025-08-14 2025Server-Side Request Forgery (SSRF)- PortSwigger Labs | by Michael Koczwara
The content is about Server-Side Request Forgery (SSRF) and is part of PortSwigger Labs. It likely discusses the concept of SSRF, which is a type of vulnerability that allows attackers to manipulate server requests from the server side. The article may cover how SSRF attacks work, their impact on security, and potential mitigation strategies. It is written by Michael Koczwara and is likely to provide insights and guidance on understanding and addressing SSRF vulnerabilities in web applications.
SSRF
2025-07-12 2025Blind SSRF via Burp Collaborator 1 App fetches URLs (PDF gen webhook etc.) 2 Send URL pointing to Burp Collaborator 3 No visible response but OAST logs the request 4 Confirms SSRF vulnerability No output no bug #bugbounty #ssrf #burp #oast
The content discusses a method for exploiting a Blind SSRF vulnerability using Burp Collaborator. It involves sending URLs to Burp Collaborator through an application that fetches URLs like PDF generation or webhooks. Despite no visible response, the Out-of-Band Application Security Testing (OAST) logs the request, confirming the SSRF vulnerability. The key takeaway is that even if there is no visible output, the presence of an SSRF vulnerability should not be overlooked. This information is relevant for bug bounty hunters and those interested in web security testing.
SSRF
2025-06-28 2025Server-Side Bugs That Pay Big SSRF (internal request abuse) SSTI (template injection) XXE (XML Entity Injection) Log4Shell-style payloads Blind bugs with Burp Collaborator Quiet bugs massive impact. #BugBounty #SSRF #EthicalHacking #bugbountytip
The content discusses lucrative server-side bugs like SSRF, SSTI, XXE, Log4Shell-style payloads, and blind bugs with Burp Collaborator. These vulnerabilities can have a significant impact and are valuable for bug bounty programs and ethical hacking. Emphasizing the importance of identifying and addressing these issues, the post highlights their potential for exploitation and the need for vigilance in cybersecurity.
SSRF
2025-05-08 2025Completed Server-Side Vulnerabilities Learning Path at PortSwigger Thrilled to finish PortSwigger's Server-Side Vulnerabilities path gaining insight into web system exploits. #WebSecurity #CyberSec #PortSwigger #Learning #SQLInjection #SSRF #Auth #Vulns
The content highlights the completion of the Server-Side Vulnerabilities Learning Path at PortSwigger, expressing excitement at gaining insights into web system exploits like SQL injection, SSRF, and authentication vulnerabilities. The individual is thrilled to finish the learning path and shares hashtags related to web security, cybersecurity, learning, and PortSwigger.
SSRF
2025-04-30 2025#burp #pentest #ai #hackerassociate #cybersecurity #infosec… | Harshad Shah
Setting Up #Burp MCP Server on Claude Desktop #Pentest Modern App with #Ai ⇢ Learn how to set up a 𝗕𝘂𝗿𝗽 𝗠𝗖𝗣 𝗦𝗲𝗿𝘃𝗲𝗿 on your 𝗖𝗹𝗮𝘂𝗱𝗲 𝗱𝗲𝘀𝗸𝘁𝗼𝗽 in this easy-to-follow tutorial. ⇢ Get your server up and...
AIBurpTalks
2025-04-03 2025Sticky Burp, Reusable and Replaceable Environment Variables
Library for managing reusable environment variables ("stickies") within Burp Suite. This tool allows users to capture selected text from request and response panes across various Burp tabs, such as Proxy and Repeater. Stickies are stored with names, values, source information, and notes, enabling quick replacement of payload content with these stored variables, useful for exploit server URLs, authentication tokens, or dynamic response data. Professional editions persist stickies across Burp projects.
Burp
2025-03-10 2025GitHub - vsec7/BurpSuite-Xkeys: A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Extension for Burp Suite that passively scans webpages to extract sensitive strings like keys, secrets, and tokens. It lists these findings as information issues within Burp's issues box and output extender, aiding in the identification of potential security vulnerabilities by highlighting credential leakage.
BurpSecrets
2025-03-08 2025GitHub - trufflesecurity/trufflehog-burp-suite-extension: Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc) using TruffleHog.
Extension for Burp Suite that scans HTTP traffic for over 800 types of secrets, including API keys, passwords, and SSH keys, leveraging TruffleHog. It operates by writing traffic to temporary files and invoking TruffleHog scans every 10 seconds, reporting findings in a dedicated tab. The extension supports secret verification and can be configured to scan various Burp Suite traffic sources.
BurpSecrets
2025-02-05 2025SSRF: Anatomy of a Cloud Attack @ Cloud Village | @seasides_conf 2025! Join @Zero0x00 as he explores SSRF attacks with Burp Suite & AWS Metadata. A must-attend for cloud security pros! 22 Feb 2025 #CloudSecurity #SSRF #Seasides2025
The content discusses an upcoming session at the Cloud Village event at the Seasides Conference 2025, focusing on SSRF attacks using Burp Suite and AWS Metadata. Led by @Zero0x00, the session is aimed at cloud security professionals and is scheduled for February 22, 2025. It emphasizes the importance of understanding SSRF attacks in cloud security. Attendees are encouraged to join to gain insights into this critical aspect of cloud security.
SSRF
2025-02-03 2025Nowy odcinek na YouTube! Jak działa SSRF (Server-Side Request Forgery) i jak atakujący mogą manipulować żądaniami HTTP? Sprawdź jak wykrywać i testować tę podatność! Obejrzyj teraz: #SSRF #Cybersecurity #BurpSuite #Pentesting #WebSecurity
The content discusses a new YouTube episode about SSRF (Server-Side Request Forgery), explaining how attackers manipulate HTTP requests and how to detect and test this vulnerability. It invites viewers to watch the episode to learn more about SSRF, cybersecurity, BurpSuite, pentesting, and web security. The link provided directs viewers to the YouTube video.
SSRF
2025-02-01 2025Looking for a Burp Collaborator alternative for SSRF testing? Bug bounty hunters & pentesters Interactsh is a must-have for SSRF exploitation web security and bug bounties. #BugBounty #PenetrationTesting #SSRF #HackingTools #ProjectDiscovery
Interactsh is recommended as a Burp Collaborator alternative for SSRF testing by bug bounty hunters and pentesters. It is considered essential for SSRF exploitation, web security, and bug bounties. The tool is highlighted for its effectiveness in these areas and is associated with Bug Bounty, Penetration Testing, SSRF, Hacking Tools, and Project Discovery.
SSRF
2025-02-01 2025A Burpsuite Extension For JS Reconnaissance - Jsmon
Extension for Burpsuite that integrates Jsmon's JavaScript scanning and monitoring capabilities, automatically analyzing HTTP history for client-side exposures and secrets. Features include automatic or manual analysis, scope filtering to optimize API calls, and seamless integration within Burpsuite's workflow for enhanced web security testing.
BurpRecon
2025-01-30 2025BChecks - IntelliJ IDEs Plugin | Marketplace
Provides support for the BCheck language, used to provide custom scan checks for Burp Suite Professional and Burp Suite Enterprise. Key features: Syntax highlighting...
Burp
2025-01-28 2025GitHub - IckoGZ/burp-deepseek: A quick and dirty (and a little shitty) burp extension that uses cheap deepseek api to send request and response and maybe found something interesting.
Library integrating the DeepSeek API into Burp Suite for AI-driven security analysis. This beta-stage plugin allows users to send HTTP requests and responses from Burp Suite's Proxy or Repeater to DeepSeek for vulnerability detection and sensitive data identification. It features context menu integration, asynchronous API calls, customizable prompts, and generates "DeepSeek Analysis" issues within Burp's Scanner.
Burp
2025-01-15 2025Blind #SSRF vulnerabilities can be detected by monitoring response times & using out-of-band techniques like DNS/HTTP callbacks. Set up a Burp Collaborator or interactsh server to catch those internal network calls. #InfoSec #BugBounty #WebSecurity
Blind SSRF vulnerabilities can be identified by monitoring response times and utilizing out-of-band techniques like DNS/HTTP callbacks. Setting up a Burp Collaborator or interactsh server can help capture internal network calls. This approach enhances information security, aids in bug bounty programs, and strengthens web security measures.
SSRF
2025-01-12 2025Quick and dirty way to find parameters vulnerable to LFI & Path Traversal & SSRF & Open Redirect: Burp Search Regex \?.=(\/\/?\w|\w\/|\w(%3A|:)(\/|%2F)|%2F|[\.\w]\.\w{24}[\w]) And find potentially vulnerable SSRF params - https://t.co/6cfBPVn0FM #SSRF #cybersec https://t.co/ipnHHHaID4
The content discusses a method using Burp Search Regex to identify parameters vulnerable to LFI, Path Traversal, SSRF, and Open Redirect. The provided regex pattern helps in finding potentially vulnerable SSRF parameters. The focus is on cybersecurity, specifically SSRF vulnerabilities. The content includes a link for further reference.
SSRF
2025-01-09 2025Automated SSRF Detection! #BugBounty #SSRF #Regex #bugbountytips #burpsuite Prepare for success: 1 Use a DNS log platform (e.g. Burp Collaborator or https://t.co/UiHRbhDCC8). 2 Ready these regex patterns:
The content discusses automated SSRF detection for bug bounty programs, emphasizing the use of a DNS log platform like Burp Collaborator and specific regex patterns. It suggests preparing for success by utilizing these tools and resources to enhance SSRF vulnerability detection. The post also includes relevant hashtags and a link to regex patterns for reference.
SSRF
2024-12-31 2024GitHub - hackerassociate/SSRF-Hacks-IP-Decimal: A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad Shah.
Extension that automatically converts IPv4 addresses to decimal notation, integrated into Burp Suite's context menu. This tool aids security professionals in bypassing Web Application Firewalls (WAFs) and testing Server-Side Request Forgery (SSRF) vulnerabilities by replacing standard IP formats with their decimal equivalents, logging all conversions in real-time.
BurpSSRF
2024-12-16 2024socalledhacker: Don't want to use Burpsuite collaborator for SSRF hunting... Check this out an amazing replacement of collaborator:- #bugbounty #bug #bugbountytip #bugbountytips @cybersecurity #infosec #SSRF
The content shared by socalledhacker discusses an alternative to using Burpsuite collaborator for SSRF hunting. The post highlights a replacement tool and encourages users to explore it. The hashtags used indicate the focus on bug bounty, cybersecurity, infosec, and SSRF. The post is shared on Twitter by socalledhacker.
SSRF
2024-12-12 2024API Testing with Insomnia and Burp Suite: An Alternative to Postman
Library for API testing and hacking, demonstrating how to use Insomnia and Burp Suite as an alternative to Postman. It details capturing API requests with mitmproxy, converting them to OpenAPI 3.0 format using mitmproxy2swagger for import into Insomnia, and leveraging Insomnia's features like variable management and Burp Suite integration for testing vulnerabilities such as Improper Asset Management.
API SecBurp
2024-12-03 2024burp-extensions-montoya-api-examples/customlogger/src/main/java/example/customlogger/MyTableModel.java at main · PortSwigger/burp-extensions-montoya-api-examples
Library example demonstrating how to create a custom table model within a Burp Suite extension using the Montoya API. This code snippet focuses on logging HTTP responses, specifically capturing the `toolSource` and the URL of the `initiatingRequest`, and displaying them in a tabular format. The `MyTableModel` class extends `AbstractTableModel` and manages a list of `HttpResponseReceived` objects, providing methods for adding new entries and retrieving data for display.
Burp
2024-12-03 2024Hacking API discovery with a custom Burp extension
Library for enhancing API discovery within Burp Suite, this extension dynamically generates over 4,000 potential API documentation paths, including Swagger and OpenAPI formats, and recursively checks discovered directories. It employs an exponential backoff strategy for resilient requests and utilizes parallel processing to accelerate the discovery of API documentation artifacts.
API SecBurp
2024-12-03 2024Burp-Montoya-Utilities/src/main/java/com/coreyd97/BurpExtenderUtilities/PopOutPanel.java at master · CoreyD97/Burp-Montoya-Utilities
Library code for a Burp Suite extension featuring a `PopOutPanel` component. This Java class enables users to detach and display Swing components in a separate JFrame, offering functionality to pop components in and out of their original context within the Burp Suite interface.
Burp
2024-11-25 2024burp-extensions-montoya-api-examples/collaborator/src/main/java/example/collaborator/CollaboratorExample.java at main · PortSwigger/burp-extensions-montoya-api-examples · GitHub
Library demonstrating the use of the Burp Collaborator Client API within a custom extension. This example shows how to create or restore a `CollaboratorClient`, log interactions received, register a request handler, and poll for new interactions periodically. It includes code for persisting the Collaborator secret key using `PersistedObject` to allow for client restoration across extension reloads, and graceful shutdown of the polling mechanism.
Burp
2024-11-19 2024Joyerz5: Just Discovered a Cool SSRF!! Now working to make it Impactful!! Any tips guys? How I Found it? On the Image Upload features there was fetch image from URL guess what? Yes I put burp collaborator Link there and got HTTP DNS response back! It is confirm now! #ssrf #bugbounty
The content describes a cybersecurity enthusiast, Joyerz5, who discovered a Server-Side Request Forgery (SSRF) vulnerability while testing an image upload feature. By inserting a Burp Collaborator link, they received an HTTP DNS response, confirming the SSRF. Joyerz5 is now seeking tips to maximize the impact of this finding, indicating involvement in bug bounty programs. The post highlights the importance of identifying and exploiting vulnerabilities like SSRF for security testing and rewards.
SSRF
2024-10-05 2024Mindmap/Burp Suite/Burp Suite Normal.png at main · Ignitetechnologies/Mindmap
This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them - Ignitetechnologies/Mindmap
Burp
2024-10-03 2024Automate your API hacking with Autorize
Library for automating API security testing, Autorize is a Burp Suite extension that detects broken object level authorization (BOLA) by repeatedly sending requests with different user privileges. It analyzes response changes to identify authorization and authentication issues, supporting active scans and offering configuration for interception filters and enforcement detectors. Autorize can be integrated with Repeater and customized to filter results for potential bypasses and 401 status codes, aiding in the discovery of vulnerabilities like unauthorized access to administrative functions.
API SecAuthNAuthZ
2024-10-03 2024Top 10 Browser Extensions Every Bug Bounty Hunter Needs
As bug bounty hunters, we need to save time by avoiding constant switching between the terminal, multiple tabs, Burp Suite (including…
Bug BountyBurp
2024-09-21 2024Proving API exploitability with Burp Collaborator
Library for demonstrating API exploitability using Burp Collaborator. This technique leverages out-of-band application security testing (OAST) to prove vulnerabilities like insecure deserialization, SSRF, open redirects, and blind XXE without requiring reverse shells. It works by sending crafted payloads that interact with Burp Collaborator's mock network services, capturing DNS, HTTP/HTTPS, or SMTP interactions to confirm an attack's potential. The article details how to configure and use Burp Collaborator, referencing its application in testing CVE-2023-40044 and crAPI.
API SecBurp
2024-09-16 2024PyCript: Burp Suite extension that allows for bypassing client-side encryption
Library for Burp Suite that bypasses client-side encryption by enabling manual and automated decryption/encryption of requests. PyCript allows for custom logic via JavaScript and Node.js, handles encryption keys and IVs within request headers or bodies, and integrates with Burp Scanner, SQLMap, and Intruder for testing in plain text.
BurpPython
2024-09-04 2024@SandroBruscino: Learn how attackers bypass URL validation in SSRF attacks! PortSwigger's latest cheat sheet reveals key techniques. "Understanding these flaws is critical for defending web apps." #CyberSecurity #SSRF #WebSecurity
The content discusses how attackers bypass URL validation in SSRF attacks, with PortSwigger's cheat sheet revealing key techniques. Understanding these flaws is crucial for defending web apps. The post emphasizes the importance of cybersecurity, SSRF, and web security. Sandro Bruscino's tweet highlights the significance of recognizing and preventing vulnerabilities in web applications to enhance cybersecurity measures.
SSRF
2024-08-30 2024GitHub - e1abrador/Burp-Encode-IP: Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.
Library for Burp Suite that encodes IP addresses using various techniques like Unicode, IPv6 formats, hexadecimal, octal, and mixed integer representations. It aims to bypass application IP or domain blacklists, aiding in testing SSRF, Open Redirect, and RFI vulnerabilities. The extension also supports DNS rebinding and collaborator integration for advanced testing scenarios.
Burp
2024-08-22 2024BChecks/vulnerability-classes/injection at main · PortSwigger/BChecks · GitHub
BChecks collection for Burp Suite Professional and Burp Suite Enterprise Edition - PortSwigger/BChecks
BurpRCESQLiXSS
2024-08-16 2024Rajan22m: I completed the Web Security Academy lab: SSRF with blacklist-based input filter @WebSecAcademy #portswigger #websecurity #lab #hacking #ethicalhacker #ethicalhacking #bug #bugbountytips #ssrf #server
Rajan22m completed the Web Security Academy lab on SSRF with a blacklist-based input filter. The post includes hashtags related to web security, hacking, ethical hacking, bug bounty tips, SSRF, and servers. The completion of this lab likely signifies Rajan22m's progress and expertise in web security and ethical hacking.
SSRF
2024-08-16 2024GitHub - 0x999-x/jsluicepp: jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic using the CLI tool jsluice
Extension integrating the jsluice CLI tool with Burp Suite for passive and active scanning of JavaScript traffic. It extracts URLs, paths, and secrets from JavaScript files, offering features like context menu processing, passive proxy scanning, URL monitoring with diff detection, and sending findings to Repeater. It also supports secret detection and scoped processing.
Burp
2024-08-14 2024basu_banakar: Thread On: Testing for Blind/Non-Blind SSRFs using redirection in integrations where there are some filters. #bugbountytips #BugBounty #ssrf #bugbountytips 1. Hit the integration by using burp collaborator by using random credentials.
The content discusses testing for Blind/Non-Blind SSRFs using redirection in integrations with filters. The suggestion is to test by hitting the integration with Burp collaborator using random credentials. The post is shared on Twitter by basu_banakar. The focus is on bug bounty tips related to SSRF vulnerabilities.
SSRF
2024-08-03 2024Testing Handbook - Burp
Watch the recording Testing Handbook: Burp Suite Professional https://appsec.guide
BurpTalks
2024-08-03 2024Mastering Web Research with Burp Suite
Mastering Web Research with Burp Suite
Burp
2024-08-03 2024Beyond the Limit: Expanding single-packet race condition with a first sequence sync for breaking the 65,535 byte limit
Writeup detailing a technique to bypass the 1,500-byte single-packet attack limit for race conditions by combining IP fragmentation and TCP sequence number reordering. This method allows for the exploitation of vulnerabilities requiring a large number of simultaneous requests, potentially overcoming limitations like HTTP/2's SETTINGS_MAX_CONCURRENT_STREAMS by sending many large TCP packets out-of-order until the final packet with the first sequence number triggers simultaneous processing.
Fuzzing
2024-08-02 2024GitHub - synacktiv/HopLa: HopLa Burp Suite Extender plugin - Adds autocompletion support and useful payloads in Burp Suite
Library enhancing Burp Suite with AI-powered autocompletion, chat, and request transformation. Integrates with OpenAI, Gemini, and Ollama, offering dynamic payload insertion, collaborator domains, and custom keyword management. Supports extensive YAML-based payload customization and hotkeys for efficient testing, building upon concepts from PayloadsAllTheThings.
Burp
2024-07-31 2024Extending Burp Suite for fun and profit - The Montoya way - Part 5 - hn security
Setting up the environment + Hello […]
Burp
2024-07-30 2024Here's how I get the most out of Burp Suite reporting
Library for extracting detailed vulnerability data from Burp Suite Professional, enabling comprehensive reporting. It covers generating HTML reports from scanner findings, including full requests and responses, and exporting raw HTTP history from Proxy and Repeater tabs as XML. The library facilitates structured reporting for both technical and non-technical audiences by providing access to scan results, proxy logs, and repeater sessions, crucial for effective vulnerability communication.
Burp
2024-07-30 2024JS Link Finder Burp Suite Extension Guide
Improve your bug bounty hunting, pentesting, and appsec skills with the JS Link Finder Burp Suite Extension. Discover hidden endpoints and…
Bug BountyBurp
2023-12-06 2023videos[1] = "GAP Burp Extension"
videos[1] = "GAP Burp Extension" https://www.youtube.com/watch?v=Os3bN0zUROA
Burp
2023-11-03 2023Burp Suite Shorts | Automatic Session Handling
The content is a video titled "Burp Suite Shorts | Automatic Session Handling" available on YouTube. It likely provides a concise tutorial or demonstration on how to utilize automatic session handling within the Burp Suite tool. This feature can streamline the process of managing and maintaining sessions during security testing and web application assessments. Viewers can expect to learn how to automate session handling tasks to enhance efficiency and effectiveness in their security testing workflows.
AuthNBurp
2023-11-03 2023Burp Suite Shorts | Automatic Session Handling
Burp Suite Shorts | Automatic Session Handling https://www.youtube.com/watch?v=yoENNJjC4NY
AuthNBurp
2023-10-29 2023PortSwigger/BChecks: BChecks collection for Burp Suite Professional
Library of BChecks written in the BChecks language for Burp Suite Professional and DAST. This collection includes custom scan checks developed by PortSwigger and the community, covering vulnerabilities like Blind SSRF, exposed git directories, leaked AWS Tokens, Log4Shell, Server Side Prototype Pollution, and suspicious input transformations, with specific checks for CVE-identified vulnerabilities. Documentation, examples, and a definition reference are available for creating and testing your own BChecks.
Burp
2023-10-13 2023Understanding File Upload Vulnerabilities in Web App Penetration Testing | 2023
Understanding File Upload Vulnerabilities in Web App Penetration Testing | 2023 https://ift.tt/8aVoHYJ
RCE
2023-09-15 2023burp.IBurpExtenderCallbacks java code examples
burp.IBurpExtenderCallbacks java code examples https://ift.tt/je1FMoP
Burp
2023-09-03 2023Proxying Burp Traffic through VPS using SOCKS Proxy
Tunnel your BurpSuite traffic through VPS to bypass restrictions using SOCKS proxy.
Burp
2023-08-13 2023Swing in Python Burp Extensions - Part 1
Library for crafting Python Burp extensions with custom GUIs using Jython Swing. This guide details implementing tabs, `JPanel` containers with `BorderLayout`, `JButton` actions, `JSplitPane` for layout, `JScrollPane` and `JList` for displaying data, and handling `ListSelectionEvent` with `valueChanged` to prevent double-adding events. It also covers using `JTabbedPane` for multiple tabs and `JTextPane` with `StyledDocument` for styled text, as well as `JEditorPane` for displaying web content, enabling or disabling editing.
BurpPython
2023-08-03 2023Proxying MetaSploit through BurpSuite
Proxying MetaSploit through BurpSuite https://ift.tt/ZHsxq1m
Burp
2023-07-02 2023DNS Analyzer - Finding DNS vulnerabilities with Burp Suite
Library for discovering DNS vulnerabilities in web applications. This Burp Suite extension leverages Burp Collaborator to analyze DNS name resolution, helping identify potential abuse of "Forgot password?" features for account takeovers, reminiscent of Kaminsky-style attacks. It provides a Kaminsky status, scatter plots, and statistics to assess the predictability of UDP source ports and DNS IDs in DNS queries, offering a more accessible alternative to setting up dedicated DNS analysis servers.
BurpRecon
2023-06-17 2023Web Application Hacking with Burp Suite
Library of hands-on exercises for mastering Burp Suite, covering information disclosure, insecure decentralization, web socket testing, directory traversal, XXE, XSS, and SQL injection vulnerabilities. This course emphasizes practical application, guiding users through tool setup and real-world examples to equip them for comprehensive web application security testing.
Burp
2023-05-29 2023RepeaterSearch
Extension that adds a search bar to Burp Suite's Repeater tab. This tool enables users to efficiently locate requests and/or responses containing a specific string, with support for both simple text matching and regular expressions. It highlights matching repeater tabs, streamlining the process of analyzing and identifying vulnerabilities within HTTP traffic.
Burp
2023-04-13 2023How to use Burp Suite Like a PRO?
How to use Burp Suite Like a PRO? https://ift.tt/fbstnRg
Burp
2023-04-09 2023aress31/burpgpt
Library leveraging OpenAI's GPT models to detect security vulnerabilities missed by traditional scanners. BurpGPT integrates with Burp Suite, sending web traffic for analysis via customizable prompts and a placeholder system, generating automated reports of potential issues. It supports various OpenAI models, allows granular control over token usage and prompt length, and offers example use cases for tailored analysis, such as identifying CVE-related library flaws or biometric authentication vulnerabilities.
AIBurp
2023-02-17 2023Burp Suite Extensions Rarely Utilized but Quite Useful
The content discusses the underutilization of Burp Suite extensions despite their usefulness. It highlights that these extensions can enhance the functionality of Burp Suite, aiding in various security testing tasks. The article likely delves into the benefits of utilizing these extensions, such as improving efficiency, expanding capabilities, and enhancing the overall experience of using Burp Suite for security testing purposes. Overall, it emphasizes the value of exploring and incorporating these extensions into one's workflow to maximize the potential of Burp Suite.
Burp
2023-02-16 2023A Step-by-Step Guide to Writing Extensions for API Pentesting in BurpSuite
Library for creating custom BurpSuite extensions in Python, focusing on API penetration testing. It guides users through setting up a development environment with Jython, writing a basic "Hello World" extension, and then constructing a more advanced "UUID Inspector" that identifies v1 UUIDs during passive scans, registering them as issues in BurpSuite's dashboard.
Burp
2022-10-13 2022Server-Side Request Forgery (SSRF)- PortSwigger Labs
The content discusses Server-Side Request Forgery (SSRF) as presented by PortSwigger Labs. SSRF is a vulnerability that allows attackers to manipulate a server into making requests on their behalf. This can lead to unauthorized access to internal systems, data theft, or server exploitation. Understanding SSRF is crucial for developers and security professionals to prevent such attacks and secure their systems. The link provided likely offers further details or resources on SSRF from PortSwigger Labs.
SSRF
2022-06-20 2022Favorite tweet by @Burp_Suite
Favorite tweet: Burp Suite 2022.6 released to the Early Adopter channel. Includes grouped tabs for Repeater, connection reuse for HTTP/1 requests, and new preset scan modes. Also introduces the abili...
BurpXSS
2022-06-20 2022Favorite tweet by @PortSwigger
Favorite tweet: Finding Client-Side Prototype Pollution (CSPP) with DOM Invader by @garethheyes - now available on the Early Adopter channel https://t.co/ut1Buup1so — PortSwigger (@PortSwigger) Jun ...
Burp
2022-04-20 2022Favorite tweet by @Jhaddix
Favorite tweet: Asking for a friend: What's the current best low-cost, self-study, Burp Suite training out there? — Jason Haddix (@Jhaddix) Apr 19, 2022
Burp
2022-04-14 2022Favorite tweet by @e11i0t_4lders0n
Favorite tweet: Burp Extension for XSS Thread 🧵 #bugbounty #bugbountytip #bugbountytips — Tushar Verma 🇮🇳 (@e11i0t_4lders0n) Apr 14, 2022
Bug BountyBurpXSS
2022-03-21 2022Favorite tweet by @cedoxX
Favorite tweet: Nuclei-Burp-Plugin - A @Burp_Suite plugin intended to help with Nuclei template generation. https://t.co/wseZPcgBE0 @KitPloit #RedTeam #Tools #Cyber #Hacker #BugBounty #Hacking https:...
Burp
2022-03-06 2022Favorite tweet by @fardeenahmed411
Favorite tweet: Top 10 essential tools for Bug-Bounty Hunting : 1. Burp Suite / ZAP-Proxy 2. Google Dorking Script 3. DNS-Discovery 4. Reverse IP Lookup 5. Wapiti 6. INalyzer 7. IronWASP 8. Wfuzz 9. ...
Bug BountyBurpRecon
2022-03-02 2022Favorite tweet by @ptracesecurity
Favorite tweet: Nuclei-Burp Extension: run nuclei scanner directly from burp https://t.co/5eXxgjapf7 #Pentesting #BurpSuite #WebSecurity #Infosec https://t.co/xwhsoQfhRo — Ptrace Security GmbH (@ptr...
Burp
2022-01-05 20220xInfection/XSRFProbe
Toolkit for auditing and exploiting Cross-Site Request Forgery (CSRF/XSRF) vulnerabilities. XSRFProbe features a robust crawling engine and performs systematic checks to detect CSRF flaws and bypasses. It supports custom cookie values, generic headers, and accurate token-strength detection. The toolkit can generate both normal and maliciously exploitable proof-of-concept examples for identified vulnerabilities, offering detailed logging and a user-controlled workflow.
CSRF
2022-01-03 2022BUG BOUNTY HUNTING WITH BURP SUITE
BUG BOUNTY HUNTING WITH BURP SUITE
Bug BountyBurp
2021-11-22 2021Burp Suite for Pentester: Software Vulnerability Scanner & Retire.js
Library for Burp Suite, "Software Vulnerability Scanner" leverages the vulners.com API to identify software versions vulnerable via CPE fingerprints or path matching. It also includes "Retire.js" to detect outdated JavaScript libraries within web applications.
Burp
2021-10-29 2021Improvements to Burp Suite authenticated scanning
Library improvements to Burp Suite's authenticated scanning in version 2021.9.1 enhance testing of complex web applications by enabling recording and replay within iframes. The update addresses issues with animated elements, SVG icons within buttons, and JavaScript-driven redirections, improving accuracy and efficiency. It also adds support for multi-select elements, further streamlining the process of scanning privileged areas of modern web applications.
AuthZBurp
2021-08-30 2021Web App Pentesting With Burp Suite Scan Profiles | White Oak
This article is a summary of a DEF CON 32 talk on hardware fault injection. The talk covered techniques like voltage glitching and clock manipulation to bypass security mechanisms. It also discussed common hardware vulnerabilities found in embedded systems and IoT devices, and presented methods for exploiting them.
Burp
2021-08-30 2021Web App Pentesting With Burp Suite Scan Profiles
Guide on optimizing Burp Suite scan profiles for effective web application penetration testing, detailing strategies for vulnerability discovery and risk management.
Burp
2021-08-25 2021Burp Suite for Pentester: Repeater
Library for Burp Suite Professional's Repeater, enabling pentesters to modify and resend HTTP requests to analyze server responses. Features include tab renaming, changing request methods (GET, POST, etc.), navigating request history, pasting URLs directly as requests, automatic URL encoding for easier parameter handling, configurable redirection following, and search functionality within requests and responses for efficient analysis of web application behavior.
Burp
2021-08-21 2021Why u should use burp to test Path Traversal Vulnerability and also get RXSS
Why u should use burp to test Path Traversal Vulnerability and also get RXSS
BurpXSS
2021-07-25 2021burpa: Burp Automator
Library for automating Burp Suite scans, burpa offers a high-level CLI and Python interfaces to launch Dynamic Application Security Testing (DAST) scans. It utilizes the official REST API for scan execution and report generation, supporting authenticated scans with application credentials. Configuration can be managed via environment variables or `.env` files. Burpa provides commands for scanning URLs, generating reports, scheduling scans, stopping Burp Suite, and testing API connectivity.
Burp
2021-07-19 2021Leveraging Burp Suite extension for finding IDOR(Insecure Direct Object Reference).
This content describes using a Burp Suite extension to discover Insecure Direct Object References (IDORs). IDOR vulnerabilities allow attackers to access unauthorized data by manipulating object references. The extension likely automates or streamlines the process of identifying these weaknesses. No specific bounty payout amount is mentioned in this content.
BurpIDOR
2021-06-05 2021Automating Burp Suite -4 | Understanding And Customising Custom Header From
The content discusses the creation of a Burp Extension using Jython to automate Burp Suite tasks. Specifically, it focuses on adding custom headers to requests. This is the fourth tutorial in the series, emphasizing understanding and customizing custom headers. The tutorial likely provides step-by-step instructions on how to implement this feature within Burp Suite for automated testing and customization purposes.
Burp
2021-05-05 2021PimpMyBurp
PimpMyBurp is a collection of Burp Suite extensions designed to enhance its functionality. It provides a variety of tools to improve the efficiency of security professionals. These extensions offer features for tasks such as advanced scanning, request manipulation, and data analysis, ultimately aiding in the discovery and exploitation of vulnerabilities.
Burp
2021-05-04 2021Detecting and annoying Burp users
Technique for detecting and disrupting Burp Suite usage, including methods for identifying the web interface via favicon MD5 hashes and localhost resolution, detecting TLS man-in-the-middle with PortSwigger issuer checks and JA3 fingerprinting, exploiting infinitely chunked responses, enumerating EventListeners to detect browser extensions, and leveraging Brotli compression and user-agent discrepancies. It also details ways to break Burp's crawler with unusual characters, confuse its active scanner with delays and collaborator interactions, bypass decoding, and exploit Intruder's marker character handling with PHP.
Burp
2021-04-22 2021Web App Pentesting With Burp Suite Scan Profiles | White Oak
Reference for configuring Burp Suite scan profiles to enhance web application penetration testing. This document, from White Oak Security, focuses on practical application of Burp Suite features to identify vulnerabilities efficiently.
Burp
2020-12-03 2020My First Burp Suite Extension
Library for creating custom Burp Suite extensions, written in Java. This resource details the process of setting up a Java IDE like Netbeans to debug extensions directly within Burp Suite, implementing the `IBurpExtender` and `IScannerCheck` interfaces, and constructing `IScanIssue` objects to report findings. The example extension checks for the presence of specific response headers during passive scans.
Burp
2020-05-30 2020BurpSuite Extensions: Some Favorites - VDA Labs
Library of Burp Suite extensions featuring Taborator for out-of-band interactions, JSON Beautifier and .NET Beautifier for improved readability, Active Scan++ for enhanced issue detection including Shellshock, and Freddy for deserialization vulnerabilities. Additional tools like HTML5 Auditor, CSP-Bypass, AWS Security Checks, Retire.js for outdated JavaScript, SSL Scanner for TLS issues, J2EEScan with CVE-2010-1871 and CVE-2011-2730, Error Message Checks, Software Vulnerability Scanner via Vulners.com API, CSRF Scanner, Collaborator Everywhere for backend systems, and Upload Scanner for file upload bypasses are also detailed.
Burp
2020-02-25 2020doyensec/graph-ql: GraphQL Security Research Material
Tool for GraphQL security testing, InQL offers a Scanner to auto-generate queries and mutations, a Points of Interest analysis for vulnerability detection, and circular reference detection. It seamlessly integrates with Burp for enhanced interactions, supports custom headers, and allows batch GraphQL attacks. InQL also includes an engine fingerprinting scanner to retrieve backend server technology information and can recreate schemas even when introspection is disabled.
GraphQL
2019-11-14 2019PortSwigger Launches Web Security Academy
Academy launched by PortSwigger, offering free interactive labs and reading materials to address global cybersecurity talent shortages. The platform features content on clickjacking, WebSocket, HTTP request smuggling, server-side request forgery, and XXE injection, allowing users to practice in a safe, risk-free environment and track their progress. The content will be continually updated to reflect evolving cyber threats.
Burp
2019-08-23 2019How i exploit out-of-band resource load (HTTP) using burp suite extension plugin (taborator)
The content discusses exploiting out-of-band resource load using a Burp Suite extension plugin called Taborator. It focuses on the background of the issue, likely related to leveraging HTTP requests to manipulate or extract data from a target system. The use of Burp Suite, a popular web vulnerability scanner, in combination with the Taborator plugin suggests a method for identifying and potentially exploiting vulnerabilities related to out-of-band resource loading. This technique could be used for security testing and identifying weaknesses in web applications.
Burp
2019-03-10 2019The Top 5 Burp Suite Extensions
Extensions for Burp Suite enhance its capabilities for security researchers. XSS Validator aids in confirming cross-site scripting vulnerabilities by using PhantomJS to verify findings. Burp Notes improves documentation by allowing detailed saving of target and attack information. Sentinel offers a free alternative to Burp Pro's scanner. Random IP Address Header helps evade WAFs by periodically altering the IP address. Bupy and Python Scripter enable custom script development for advanced Burp manipulation.
Burp
2018-11-08 2018AES-Killer v3.0 - Burp Plugin To Decrypt AES Encrypted Traffic Of Mobile Apps On The Fly
AES-Killer v3.0 is a Burp plugin designed to decrypt AES encrypted traffic from mobile apps in real-time. This tool allows for the decryption of encrypted data on the fly, aiding in the analysis of mobile app traffic for security testing and debugging purposes.
Burp
2018-06-08 2018SleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Po
SleuthQL is a tool designed to parse Burp history and identify potential SQL injection points. It aims to assist in discovering vulnerabilities related to SQL injection by analyzing requests and responses within Burp Suite. This tool is useful for security professionals and researchers looking to enhance their testing capabilities and identify potential weaknesses in web applications.
Burp
2017-03-07 2017PortSwigger Web Security Blog: Adapting AngularJS Payloads to Exploit Real
Writeup detailing techniques for adapting AngularJS template injection payloads to bypass filtering and encoding, specifically targeting Piwik and Uber. The article demonstrates exploiting Piwik's handling of referral queries and Uber's documentation site, showcasing payload adaptations using Unicode escapes, `concat` instead of `valueOf`, string manipulation via `toString` and array joins, and exploiting JavaScript sandbox limitations. It highlights successful exploitation against AngularJS versions 1.2.26 and 1.2.0, noting rapid patching by Uber.
XSS
2017-03-07 2017PortSwigger Web Security Blog: XSS without HTML: Client-Side Template Injec
Library for detecting and exploiting Angular Template Injection vulnerabilities in AngularJS applications. It details how naive usage of the popular JavaScript framework can lead to Cross-Site Scripting (XSS) by enabling the execution of Angular expressions. The library covers the development of a sandbox escape technique, specifically for Angular versions 1.3.1+ and 1.4.0+, by backdooring the `String.fromCharCode` function using `Array.prototype.join` to inject arbitrary JavaScript, including a demonstration of bypassing the Angular sanitizer.
XSS
2016-12-28 2016The Top 8 Burp Suite Extensions - Think outside the box
The content is a title mentioning the top 8 Burp Suite extensions and encourages thinking outside the box when using these tools. It suggests that these extensions can enhance the functionality of Burp Suite, a popular web application security testing tool. The focus is on exploring innovative ways to utilize these extensions to improve security testing processes.
Burp

sqlmap sqlmap.org #

48 resources across 10 topics: AI, API Sec, Bug Bounty, Fuzzing, GraphQL, Mobile, Python, RCE, SQLi, Talks.

DateResourceTopics
2026-04-28 2026LiteLLM Contains Critical SQL Injection Vulnerability
LiteLLM, a library simplifying API calls to LLMs, has a critical SQL injection vulnerability. This flaw allows attackers to execute arbitrary SQL queries, potentially leading to data breaches, unauthorized access, or system compromise. The vulnerability arises from improper sanitization of user-supplied input within the library's database interaction logic. Users are strongly advised to update LiteLLM to the latest version to patch this critical security flaw and protect their systems. No specific bounty payout amount was mentioned.
API Sec
2026-04-22 2026SQLMap Tamper Collection: Modern WAF Bypass Scripts (Cloudflare, AWS, Azure)
Library for context-aware SQL transformation and WAF bypass, supporting Cloudflare, AWS, and Azure. It features a full SQL lexer with UUID tracking, multi-character operator support, and deterministic output preserving SQL validity. Transformations include keyword wrapping, space replacement, value encoding, and case alternation, with advanced options like homoglyphs and numeric obfuscation. The framework maintains SQL structure, handles nested subqueries, and offers reapplication protection, designed primarily for MySQL syntax.
SQLi
2026-04-22 2026Pentesting PostgreSQL with SQL Injections
Library for analyzing and exploiting SQL injection vulnerabilities specifically targeting PostgreSQL. It details bypass methods for web application firewalls, techniques for data exfiltration across various query clauses including SELECT, WHERE, FROM, and ORDER BY, and demonstrates how to exploit nested queries. The resource covers bypassing spaces, trailing data, quotation marks using dollar quoting or `CHR()` function, and utilizes time-based blind SQL injection with concatenation and conditional logic for data leakage.
SQLi
2026-04-22 2026CVE-2025-52694 PoC: Critical SQL Injection in Advantech IoTSuite/SaaS-Composer
Toolchain for CVE-2025-52694, a critical unauthenticated SQL Injection vulnerability impacting Advantech IoTSuite/SaaS-Composer products prior to specific versions. The PoC offers a standalone Python script for time-based SQL injection tests and a nuclei template utilizing a clusterbomb attack to discover vulnerable `org_id` values. Exploitation allows for database dumping, data modification, and potential RCE by unsafely concatenating the `filename` parameter into PostgreSQL queries.
SQLi
2026-04-22 2026MCP Vulnerability Case Study: SQL Injection in the Postgres MCP Server
Writeup on a SQL injection vulnerability in Anthropic's reference Postgres MCP server, allowing arbitrary SQL execution by terminating the read-only transaction with a `COMMIT;` statement. Though deprecated, the `@modelcontextprotocol/server-postgres` NPM package and `mcp/postgres` Docker image see significant weekly downloads. The vulnerability is patched in the Zed Industries fork (`@zeddotdev/postgres-context-server` v0.1.4) and an unreleased reference implementation. Users should avoid the deprecated server for sensitive data and consider the Zed Industries fork for mitigation.
SQLi
2026-04-22 2026BWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL Injections
BWAFSQLi: Bypassing Web Application Firewall with Adversarial SQL Injections
SQLi
2026-04-17 2026Discovering GraphQL endpoints and SQLi vulnerabilities
Discovering GraphQL endpoints and SQLi vulnerabilities
GraphQL
2026-04-17 2026HackerOne Report #435066: SQL injection in GraphQL endpoint
HackerOne Report #435066: SQL injection in GraphQL endpoint
GraphQL
2026-04-16 2026SQLMap Cheat Sheet: Commands, Options, and Advanced Features
Cheatsheet detailing sqlmap commands, options, and advanced features for automating SQL injection detection and exploitation. It covers system requirements, installation, various SQLi attack techniques including in-band (error-based, union-based, stacked queries, inline queries), out-of-band, inferential (boolean, time-based), and compound attacks, alongside essential options for reconnaissance, enumeration, and vulnerability scanning.
SQLi
2026-04-15 2026SAP Security Patch Day April 2026: Critical Vulnerabilities CVSS 9.9 SQL Injection and Authorization Risks
Analysis of SAP Security Patch Day April 2026 highlights critical vulnerabilities, including a CVSS 9.9 SQL injection in SAP Business Planning and Consolidation and SAP Business Warehouse, allowing authenticated users to execute arbitrary SQL. A high-severity authorization flaw in SAP ERP and SAP S/4HANA, with a CVSS of 7.1, permits authenticated users to overwrite existing executable reports. Medium-priority issues affect SAP BusinessObjects BI Platform with denial-of-service and SAP Human Capital Management for SAP S/4HANA with information disclosure. Practitioners like SecurityBridge, Pathlock, and Layer Seven Security detail exploitation paths, internal authorization risks, and cross-layer exposure across SAP environments.
SQLi
2026-04-15 2026FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion
FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion https://ift.tt/ENselVr
SQLi
2026-04-14 2026CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks
CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks https://ift.tt/HrQnkXP
SQLi
2026-04-14 2026SAP Patch Day Fixes Critical SQL Injection DoS and Code Injection Flaws
SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws https://ift.tt/wOQTGjW
SQLi
2026-04-14 2026SAP Patch Day Fixes Critical SQL Injection DoS and Code Injection Flaws
SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws https://ift.tt/lgQwt4L
SQLi
2026-04-14 2026CISA Warns of Fortinet SQL Injection Flaw Actively Exploited in Attacks
CISA Warns of Fortinet SQL Injection Flaw Actively Exploited in Attacks https://ift.tt/kN2acMA
SQLi
2026-04-14 2026CISA Warns Fortinet SQL Injection Flaw Is Being Actively Exploited
CISA Warns Fortinet SQL Injection Flaw Is Being Actively Exploited https://ift.tt/3sSd5jK
SQLi
2026-04-14 2026SAP Patch Day Fixes Critical SQL Injection DoS and Code Injection Flaws
SAP Patch Day Fixes Critical SQL Injection, DoS, and Code Injection Flaws https://ift.tt/QS2AJx7
SQLi
2026-04-11 2026400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw
Library vulnerability in Elementor's Ally plugin, tracked as CVE-2026-2413, exposes over 400,000 WordPress sites to SQL injection attacks. Exploitable without authentication when the Remediation module is active, the flaw allows attackers to steal sensitive data like password hashes by manipulating database queries through crafted URL parameters. Elementor has released a patch, and users are advised to update the plugin, disable unused features, deploy a WAF, and enforce least privilege for database accounts.
SQLi
2026-04-11 2026SQL injection vulnerabilities in Owncloud Android app
Advisories detail SQL injection vulnerabilities in the Owncloud Android app, specifically impacting the `FileContentProvider` (GHSL-2022-059) and the `ReceiveExternalFilesActivity`. The `FileContentProvider` allows malicious applications to exploit SQL injection flaws through its `delete`, `insert`, `query`, and `update` methods, potentially leading to unauthorized data access or modification within the app's databases. Additionally, improper sanitization of externally provided file paths in `ReceiveExternalFilesActivity` can allow attackers to read from or write to the application's internal storage.
Mobile
2026-04-10 2026SQL Injection in 2026: It Took One Apostrophe
SQL Injection in 2026: It Took One Apostrophe
SQLi
2026-04-10 2026Advanced SQL Injection Techniques in Modern Web Apps
Writeup detailing advanced SQL injection techniques like second-order, time-based blind, and WAF bypasses through encoding and case variation. It emphasizes prevention strategies such as parameterized queries, strict input validation, and least privilege for database users, and mentions tools like SQLi Detector for automated testing, highlighting real-world applications in e-commerce platforms, CMS systems, and API endpoints.
SQLi
2026-04-10 2026Bypassing WAF with Adversarial SQL
Bypassing WAF with Adversarial SQL
SQLi
2026-04-10 2026WAF Bypass Using JSON-Based SQL Injection Attacks
Library entry detailing a WAF bypass technique using JSON-based SQL injection, building on research that found major vendors like Palo Alto Network, AWS, Cloudflare, F5, and Imperva failed to properly inspect JSON payloads. This method exploits the compatibility of databases such as PostgreSQL and MySQL with JSON, allowing malicious SQL commands to evade detection by many Web Application Firewalls.
SQLi
2026-04-10 2026SQL Injection Security Vulnerabilities
SQL Injection Security Vulnerabilities
SQLi
2026-04-10 2026CVE Search: SQL Injection
CVE Search: SQL Injection
SQLi
2026-04-10 2026SQL Injection - OWASP
Reference on SQL Injection attacks, detailing how attackers insert malicious SQL queries into application inputs to access, modify, or delete sensitive database data. It covers common attack vectors, the high severity risk associated with these vulnerabilities, and provides examples of exploitation in PHP, ASP, J2EE, and ASP.NET applications. The OWASP resource also points to prevention strategies like parameterized SQL statements and code review guides.
SQLi
2026-04-10 2026CVE-2026-26116: SQL Server SQL Injection
Writeup of CVE-2026-26116, a SQL Injection vulnerability affecting Microsoft SQL Server. Exploiting CWE-89, an authenticated attacker can elevate privileges over a network by manipulating SQL commands. Attackers with low-privilege accounts can craft malicious SQL statements to bypass authorization, access sensitive data, or gain administrative control. Mitigation involves applying Microsoft security updates, implementing parameterized queries, restricting network access, and enabling comprehensive auditing.
SQLi
2026-04-09 2026Claude Code Can Be Manipulated via CLAUDE.md to Run SQL Injection Attacks
Library that allows manipulation of Claude Code via CLAUDE.md files to automate SQL injection attacks and steal credentials. Researchers at LayerX discovered that by adding three lines of basic English to the CLAUDE.md file, Claude Code's safety guardrails can be bypassed, leading it to execute unauthorized commands and perform actions such as login bypass and database dumping using techniques like SQL injection. The AI trusts the instructions within the CLAUDE.md file implicitly, creating a significant attack surface.
AI
2026-04-09 2026Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation Attacks
Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation Attacks https://ift.tt/7D4rhpX
SQLi
2026-04-09 2026Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation
Multiple SonicWall Vulnerabilities Enable SQL Injection and Privilege Escalation https://ift.tt/fMHBmC1
SQLi
2026-04-09 2026Multiple SonicWall Flaws Enable SQL Injection and Privilege Escalation Attacks
Multiple SonicWall Flaws Enable SQL Injection and Privilege Escalation Attacks https://ift.tt/IWwTAuM
SQLi
2026-04-06 2026Bug Bounty Bootcamp #29: Boolean Blind SQL Injection Part 2
Bug Bounty Bootcamp #29: Boolean Blind SQL Injection Part 2
SQLi
2025-08-14 2025https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/
The content discusses website penetration testing and database hacking using SQLmap. It covers the importance of penetration testing to identify vulnerabilities, the process of using SQLmap for database hacking, and steps to perform SQL injection attacks. The article emphasizes the ethical use of these techniques for security testing and highlights the risks associated with unauthorized hacking. It provides insights into the tools and methods used in penetration testing and database hacking, aiming to enhance cybersecurity awareness and skills.
Bug Bounty
2025-08-14 2025https://vavkamil.cz/2019/10/09/understanding-the-full-potential-of-sqlmap-during-bug-bounty-hunting/
The content discusses maximizing the potential of SQLmap during bug bounty hunting. It covers the importance of understanding SQL injection vulnerabilities, using SQLmap effectively, and customizing its options for better results. The article emphasizes the significance of proper reconnaissance, parameter identification, and evasion techniques to enhance the success rate of SQL injection attacks. It also provides insights into exploiting blind SQL injection vulnerabilities and leveraging SQLmap's advanced features to automate the detection and exploitation process. Overall, the content aims to help bug bounty hunters utilize SQLmap efficiently for discovering and exploiting SQL injection vulnerabilities.
Bug BountySQLi
2024-11-13 2024SQLMap Command Generator
SQLMap Command Generator
SQLi
2023-09-22 2023How to turn SQL injection into an RCE or a file read? Case study of 128 bug bounty reports
How to turn SQL injection into an RCE or a file read? Case study of 128 bug bounty reports https://www.youtube.com/watch?v=ClnVdYf4PK0
RCETalks
2023-06-08 2023Test website for SQL injection vulnerabilities using Python
Test website for SQL injection vulnerabilities using Python https://ift.tt/msKlYeM
Python
2022-04-09 2022Favorite tweet by @Jhaddix
Favorite tweet: 4/8/22 #bugbountydiary #bugbountytips Everyone is sick in the house but I had some running scans I needed to check up on. I found a SQL injection bug on a blog. Here's how I did it, s...
Bug Bounty
2022-01-16 2022How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes
How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes
FuzzingSQLi
2021-04-16 2021DVWA 1.9+: Blind SQL Injection with SQLMap
The content discusses performing Blind SQL Injection on DVWA 1.9+ using SQLMap. It follows a previous article on manual SQL Injection with OWASP ZAP. The focus is on hacking DVWA through Blind SQL Injection techniques.
SQLi
2021-01-23 2021https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/
The content discusses website penetration testing and database hacking using a tool called SQLMap. It covers the process of identifying vulnerabilities in websites, exploiting them to gain unauthorized access to databases, and extracting sensitive information. The article provides a step-by-step guide on how to perform these tasks using SQLMap, a popular tool for automated SQL injection and database takeover. It emphasizes the importance of ethical hacking practices and the need for organizations to secure their websites and databases against potential cyber threats.
SQLi
2020-04-17 2020SQL Injection Cheat Sheet by Netsparker
Library: Invicti SQL Injection Cheat Sheet, this resource offers detailed technical information and attack payloads for testing various SQL injection vulnerabilities across MySQL, Microsoft SQL Server, Oracle, PostgreSQL, and SQLite. It covers techniques such as UNION attacks, stacked queries, boolean-based blind SQL injection using IF and CASE statements, and bypassing filters with hex encoding and string concatenation. The cheat sheet also highlights the utility of DAST tools like Invicti and Acunetix for automating SQLi detection.
SQLi
2019-12-29 2019https://medium.com/bugbountywriteup/sql-injection-time-and-boolean-based-27239b6a55e8?source=twitterShare-1764222123d3-1576594710&_referrer=twitter&_branch_match_id=732557985002302401
The content discusses SQL injection vulnerabilities, specifically focusing on time-based and boolean-based techniques. It explains how attackers can exploit these vulnerabilities to manipulate database queries and gain unauthorized access to sensitive information. The article likely provides examples, explanations, and possibly mitigation strategies for preventing SQL injection attacks.
SQLi
2019-11-17 2019Understanding the full potential of sqlmap during bug bounty hunting
The content discusses utilizing sqlmap, a tool for detecting and exploiting SQL injection vulnerabilities, in bug bounty hunting and ethical hacking for offensive website security. It emphasizes understanding the full potential of sqlmap to effectively identify and exploit vulnerabilities. The focus is on leveraging this tool to enhance security testing efforts and maximize the outcomes of bug bounty programs.
Bug BountySQLi
2019-10-05 2019SQL injection to RCE
The content discusses a case of SQL injection leading to Remote Code Execution (RCE) discovered during a recent customer penetration testing exercise. The author will detail the scenario in the following lines.
RCESQLi
2018-07-29 2018Making a Blind SQL Injection a Little Less Blind
The content discusses the author's experience finding a SQL Injection bug despite the belief that manual SQL Injections are no longer common. The author aims to shed light on this issue and shares insights on how to make a Blind SQL Injection less challenging.
SQLi
2018-07-19 2018Comprehensive Guide to Sqlmap (Target Options)
The article discusses the "target commands" in sqlmap, a tool for SQL injection attacks. These commands are used to specify the target website or application for the attack. Understanding and utilizing these commands effectively is crucial for successful SQL injection testing.
SQLi
2018-01-11 2018SQL Injection Wiki
Library: SQL Injection Wiki, a comprehensive resource for identifying, exploiting, and escalating SQL injection vulnerabilities across various Database Management Systems. This wiki follows a typical escalation path, assuming basic SQL injection knowledge, and includes version-specific query information. Contributions are welcomed via GitHub.
SQLi

nuclei github.com/projectdiscovery #

18 resources across 7 topics: Bug Bounty, Fuzzing, Mobile, Recon, SQLi, SSRF, XSS.

DateResourceTopics
2026-04-17 2026Recon-Script: automation with Nuclei (s1d6point7bugcrowd)
Library for automating Nuclei vulnerability scans, integrating features like voice notifications via espeak, proxychains support, and optional cloud uploads to ProjectDiscovery Cloud Platform (PDCP). It allows for out-of-scope filtering, custom bug bounty headers, and detailed scan logging with timestamps, supporting tools such as subfinder, dnsx, and httpx.
Recon
2026-04-17 2026The Ultimate Guide to Finding Bugs With Nuclei (ProjectDiscovery)
Library for efficient, extensible vulnerability scanning using YAML-based templates. Nuclei supports HTTP, DNS, SSL, and raw TCP protocols, allowing detection of CVEs, misconfigurations, and sensitive file exposures. It integrates into workflows with other tools and offers features like custom template creation, fuzzing, advanced DSL for matchers, and various scan modes including headless and network. Advanced options include rate limiting, template filtering by technology, severity, or name, and resuming interrupted scans.
Recon
2026-04-17 2026Automate Your Nuclei Recon Pipeline with VPN + Discord Alerts
Script automates bug bounty reconnaissance by enumerating subdomains with subfinder, probing live hosts via httpx, rotating NordVPN IPs, and running Nuclei scans with specific templates and filters. It sends Discord alerts for any found vulnerabilities, detailing the count, severity, template ID, matched target, and current IP. The process is designed for repeatable, single-command execution on a list of target domains.
Recon
2026-04-16 2026From Recon to Sensitive Key Exposure Using Nuclei
From Recon to Sensitive Key Exposure Using Nuclei
Recon
2026-04-16 2026Automating Bug Bounties with Nuclei
Automating Bug Bounties with Nuclei
Bug Bounty
2026-04-16 2026Advanced Techniques & Use Cases of Nuclei for Bug Bounty
Advanced Techniques & Use Cases of Nuclei for Bug Bounty
Bug Bounty
2025-08-14 2025NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open
NucleiFuzzer is an automation tool designed to detect vulnerabilities like XSS, SQLi, SSRF, and Open. It is powerful and efficient in identifying these security issues.
FuzzingSQLiSSRFXSS
2025-08-14 2025NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open
"NucleiFuzzer is an automation tool designed to detect vulnerabilities like XSS, SQLi, SSRF, and Open. It offers powerful capabilities for automated security testing."
SSRF
2025-05-22 2025New CVE : CVE-2025-4123 Grafana open redirect XSS/SSRF via path traversal Detect it now with Nuclei template #infosec #cve #nuclei #grafana #ssrf #xss #openredirect
A new CVE, CVE-2025-4123, highlights a vulnerability in Grafana that allows open redirect, XSS, and SSRF via path traversal. The issue can be detected using Nuclei template. The post emphasizes the importance of addressing this security concern in Grafana. #infosec #cve #nuclei #grafana #ssrf #xss #openredirect.
SSRF
2024-09-26 2024Simplifying XSS Detection with Nuclei - A New Approach
Library for simplifying XSS detection, leveraging Nuclei's headless mode and the `waitdialog` action. This technique mimics real user interactions by running JavaScript, allowing for detection of XSS payload execution via JavaScript dialogs rather than relying on complex, target-specific reflection-based string matchers. The headless approach offers higher accuracy and reduced complexity, making XSS detection more consistent across different web applications.
XSS
2024-09-18 2024Cybersleuth254: Found an SSRF vulnerability using a custom Nuclei template! This bug allows attackers to inject malicious URLs and access sensitive data on the server. #Cybersecurity #SSRF #BugBounty #PenTesting #Infosec #Nuclei
Cybersleuth254 discovered an SSRF vulnerability using a custom Nuclei template, enabling attackers to inject malicious URLs and access sensitive server data. The finding highlights the importance of cybersecurity measures like bug bounties, penetration testing, and information security. #Cybersecurity #SSRF #BugBounty #PenTesting #Infosec #Nuclei.
SSRF
2024-09-18 2024Cybersleuth254: Found an SSRF vulnerability using a custom Nuclei template! This bug allows attackers to inject malicious URLs and access sensitive data on the server. Always validate inputs to prevent these threats! #Cybersecurity #SSRF #BugBounty #PenTesting #Infosec #Nuclei
Cybersleuth254 discovered an SSRF vulnerability using a custom Nuclei template, enabling attackers to inject malicious URLs and access sensitive server data. The importance of input validation to prevent such threats is emphasized. The post highlights cybersecurity, SSRF, bug bounty, penetration testing, and Nuclei.
SSRF
2023-08-11 2023The Ultimate Guide to Finding Bugs With Nuclei
Library for efficient, extensible vulnerability scanning using YAML-based templates. Nuclei supports HTTP, DNS, SSL, and raw TCP protocols, allowing users to define custom checks for vulnerabilities. It can scan thousands of hosts rapidly, integrates into existing workflows, and offers template filtering by technology, severity, or CVE. Advanced features include custom template creation, fuzzing, multi-step interactions, and support for network, DNS, file, and headless modes.
Bug Bounty
2022-03-02 2022Favorite tweet by @ptracesecurity
Favorite tweet: Nuclei-Burp Extension: run nuclei scanner directly from burp https://t.co/5eXxgjapf7 #Pentesting #BurpSuite #WebSecurity #Infosec https://t.co/xwhsoQfhRo — Ptrace Security GmbH (@ptr...
Recon
2022-01-10 2022Nuclei Templates
Library of community-curated templates for the nuclei scanner, designed to detect various application security vulnerabilities. This repository houses templates developed by the project team and contributions from the security community, covering diverse attack vectors. Detailed documentation for creating custom templates is available, alongside statistics on template attributes like tags, author, severity, and type. Community engagement is encouraged through GitHub discussions and a Discord server for direct interaction with maintainers.
FuzzingRecon
2022-01-10 2022Install Nuclei
Library for fast, template-based vulnerability scanning using simple YAML templates. It supports multiple protocols like HTTP, DNS, and TCP, and can be integrated into CI/CD pipelines. Nuclei allows for custom vulnerability detection scenarios to reduce false positives and includes integrations with tools like Jira, Splunk, and GitHub. The tool requires Go version 1.24.2 or later for installation.
FuzzingRecon
2021-11-24 2021Install Nuclei
Tool for high-performance vulnerability scanning, Nuclei uses simple YAML templates for custom detection scenarios, minimizing false positives through real-world simulation. It supports numerous protocols including HTTP, DNS, and TCP, integrates with CI/CD pipelines, and offers extensive filtering and output options. Installation requires Go version 1.24.2 or later.
Bug BountyRecon
2021-06-11 2021Mobile Nuclei Templates
Library of Nuclei templates designed for mobile security assessments. It includes specific templates for Android applications, focusing on `smali` checks. A dedicated `Keys` folder provides templates to identify API keys using regex patterns on decompiled Android apps, local code repositories, or unzipped IPA files. Users should install Nuclei from its GitHub repository to utilize these templates effectively for targeted mobile app analysis.
Mobile

OWASP ZAP zaproxy.org #

15 resources across 9 topics: AI, API Sec, AuthZ, Bug Bounty, Deser, IDOR, JWT, Talks, XSS.

DateResourceTopics
2026-04-11 2026OWASP Top 10 for LLMs 2025: Key Risks and Mitigation Strategies
Survey of the OWASP Top 10 for LLM Applications (2025), detailing evolving technical and socio-technical risks like prompt injection and excessive agency. This updated list guides enterprises in securing generative AI ecosystems, from training pipelines to plugins, addressing data disclosure and systemic vulnerabilities relevant to GDPR, HIPAA, CCPA, and the EU AI Act. Invicti's proof-based scanning and LLM-specific checks are presented as tools to validate real risks and strengthen defenses.
AI
2026-04-10 2026OWASP WSTG: Testing JSON Web Tokens
Reference detailing OWASP's Web Security Testing Guide (WSTG) procedures for testing JSON Web Tokens (JWTs). It covers analyzing JWT headers and payloads for sensitive data, testing for tampering vulnerabilities, and verifying signature integrity. Specific attack vectors discussed include exploiting the "none" algorithm, the ECDSA "psychic signatures" vulnerability (CVE-2022-21449), weak HMAC key cracking using tools like crackjwt.py and John the Ripper, and HMAC vs. public key confusion attacks.
JWT
2026-04-10 2026BLA9:2025 Broken Access Control - OWASP
Reference detailing BLA9:2025 Broken Access Control, a critical OWASP Top 10 vulnerability. It explains how missing role checks, flawed logic trusting client-supplied parameters, overly broad permissions, and identifier tampering (BOLA) enable attackers to perform unauthorized operations. Examples include Gitlab branch deletion vulnerabilities and privilege escalation in hay-kot mealie v2.2.0, mapping to CWEs like CWE-863 and CWE-862, and referencing CVEs such as CVE-2021-39931 and CVE-2023-3290.
AuthZ
2026-04-10 2026OWASP A01: Broken Access Control Risks and Prevention
Library detailing OWASP A01: Broken Access Control risks and prevention. This resource clarifies the distinction between authentication and authorization, highlights the importance of the principle of least privilege (PoLP) and Role-Based Access Control (RBAC), and provides a Python Flask code snippet demonstrating secure RBAC implementation. It further explains how vulnerabilities manifest through techniques like URL manipulation and parameter tampering, and identifies common failure scenarios such as Insecure Direct Object References (IDOR) and missing function-level access control.
AuthZ
2026-04-10 2026OWASP-TOP-10 A01:2025 Broken Access Control
Library detailing Broken Access Control, a critical OWASP Top 10 risk where applications fail to enforce user restrictions. This resource highlights how attackers can exploit missing or client-side enforced authorization checks, using tools like Burp Suite to directly access backend administrative endpoints. It demonstrates the vulnerability through a case study of an application trusting client-side role validation, leading to unauthorized data access, privilege escalation, and account compromise, and emphasizes implementing server-side authorization and the principle of least privilege for mitigation.
AuthZ
2026-04-10 2026IDOR - OWASP Foundation
Reference detailing Insecure Direct Object Reference (IDOR) vulnerabilities, a class of Broken Access Control (OWASP Top 10 A01:2025). IDOR occurs when applications expose internal object references, like database keys or file names, without verifying user authorization, allowing attackers to access unauthorized resources by modifying these references in URL path parameters, query strings, or request bodies. Prevention strategies include enforcing server-side authorization, using non-sequential identifiers, applying the principle of least privilege, and validating access at the data layer.
IDOR
2026-04-03 2026Insecure Deserialization | OWASP
Reference on Insecure Deserialization, a vulnerability that allows attackers to execute code or manipulate objects by abusing an application's deserialization process with untrusted data. This vulnerability can lead to remote code execution, denial-of-service, and privilege escalation. Mitigations include avoiding deserialization of untrusted data, implementing integrity checks, enforcing strict type constraints, isolating deserialization code, logging exceptions, monitoring the process, and using alternative formats like JSON.
Deser
2026-01-09 2026OWASP CRS Vulnerability Enables Charset Validation Bypass
The content discusses a vulnerability in the OWASP CRS (Core Rule Set) that allows attackers to bypass charset validation. This vulnerability could potentially be exploited by malicious actors to evade security measures and launch attacks. It highlights the importance of addressing and patching vulnerabilities promptly to enhance cybersecurity defenses and protect systems from potential threats.
XSS
2026-01-09 2026OWASP CRS Vulnerability Allows Attackers to Bypass Charset Validation
The OWASP CRS vulnerability enables attackers to bypass charset validation, as reported on cyberpress.org. This vulnerability poses a security risk by allowing malicious actors to circumvent charset validation measures. Organizations using OWASP CRS should be aware of this issue and take necessary steps to mitigate the vulnerability to prevent potential attacks.
XSS
2025-08-14 2025OWASP Videos
The content is concise and simply states "OWASP Videos," indicating that there are videos related to the Open Web Application Security Project (OWASP). OWASP is a non-profit organization focused on improving software security. The videos likely cover various topics related to web application security, such as best practices, vulnerabilities, and tools. Viewers can expect educational content on how to secure web applications and prevent security breaches.
Talks
2025-08-14 2025XSS (Cross Site Scripting) Prevention Cheat Sheet - OWASP
Reference detailing XSS prevention techniques, emphasizing the necessity of combining defensive measures. It highlights how modern frameworks like React and Angular mitigate XSS through templating and auto-escaping, yet points out potential vulnerabilities when these frameworks are used insecurely, such as with React's `dangerouslySetInnerHTML` or Angular's `bypassSecurityTrustAs*` functions. The guide stresses the importance of output encoding, including HTML entity, attribute, JavaScript, CSS, and URL encoding, with specific advice on safe sinks like `.textContent` and `.setAttribute`.
XSS
2024-09-23 2024Sec_Mind_Maps/OWASP API TOP 10.pdf at main · h0tak88r/Sec_Mind_Maps
cyber security mind maps collection. Contribute to h0tak88r/Sec_Mind_Maps development by creating an account on GitHub.
API Sec
2024-07-22 2024DOM Based XSS | OWASP Foundation
Reference detailing DOM-based XSS (Type-0 XSS), a vulnerability where client-side scripts execute unexpectedly due to malicious modifications of the DOM environment, not the HTTP response itself. It provides examples, including a `decodeURIComponent` vulnerability and the fragment-based technique to bypass server-side detection, and mentions attacks against Adobe PDF plugins. The entry also references testing tools like DOM Snitch and the DOM XSS Wiki.
XSS
2022-02-27 2022Favorite tweet by @ZAProxyCon
Favorite tweet: You're invited to #ZAPCon 2022! ⚡️ Whether you are just getting started, or have a decade of experience with ZAP, ZAPCon will level-up your AppSec skills. 100% Virtual. 100% Free! 🎟️ ...
Bug BountyTalks
2020-01-31 2020OWASP Videos
The OWASP Foundation hosts videos on its website to educate about software security. OWASP is a nonprofit organization dedicated to enhancing software security.
Talks

TruffleHog github.com/trufflesecurity #

15 resources across 3 topics: Bug Bounty, Secrets, Supply Chain.

DateResourceTopics
2026-05-08 2026How to mitigate secrets risk and prevent future breaches
Library for detecting and managing secrets risk in code. It details how leaks of credentials, tokens, and signing keys in open source and proprietary repositories are a growing concern, with millions exposed on platforms like GitHub and npm. The library aids in situational awareness by identifying exposed secrets, understanding their purpose, and assessing their potential impact. It emphasizes investing in advanced tooling to filter false positives and prioritize active tokens, alongside evolving development practices to mitigate risks from the design stage forward, ultimately aiming to prevent future breaches.
Secrets
2026-04-19 2026Shai-Hulud: A Persistent Secret Leaking Campaign — GitGuardian
Analysis of the Shai-Hulud campaign details a persistent supply chain attack targeting NPM packages like @ctrl/tinycolor, using malicious GitHub Actions to exfiltrate secrets from local environments and repositories. Similar to the s1ngularity and GhostActions campaigns, this attack injects compromised workflows to steal credentials, including GitHub tokens, NPM tokens, and AWS Keys. GitGuardian's HasMySecretLeaked service allows developers to check for compromised secrets without exposing their values.
Supply Chain
2026-04-17 2026TruffleHog: Deep Dive on Secret Management (Jit)
Library for detecting hardcoded secrets in code. TruffleHog uses hundreds of patterns and strings to identify exposed credentials for services like AWS, GCP, and Azure, and integrates with tools like Slack and Stripe. It offers automation via pre-commit hooks and GitHub Actions, remote scanning capabilities, customizable rules, and secret verification by making API calls. The library also assists in remediating exposed secrets by providing guidance on rotating credentials and cleaning Git history using tools like BFG Repo-Cleaner.
Secrets
2026-04-17 2026TruffleHog Open Source v3 vs GitGuardian
Library comparing TruffleHog Open Source v3 and GitGuardian's code security platform for secrets detection. TruffleHog is a CLI tool for finding hardcoded secrets in repositories, while GitGuardian offers an integrated platform with automated detection, Honeytoken capabilities, alerting, incident prioritization, and remediation workflows across various version control systems. GitGuardian aims to reduce false positives through its detection engine and provides enhanced collaboration, enterprise-grade features, and dedicated support, contrasting with TruffleHog's open-source limitations in scalability and built-in functionality.
Secrets
2026-04-17 2026git-secret-scanner: Find secrets with TruffleHog & Gitleaks
Tool for finding secrets in Git organizations and groups, combining TruffleHog's classification strengths with Gitleaks' broader detection capabilities. It supports GitHub and GitLab, utilizes specific tokens with required scopes, and offers features for ignoring secrets via annotations or fingerprint files, as well as baseline scanning to detect new secrets.
Secrets
2026-04-17 2026Gitleaks vs TruffleHog 2026 Benchmarks (AppSec Santa)
Library for open-source secret scanning, comparing Gitleaks and TruffleHog. Gitleaks excels as a fast, pre-commit hook using regex for rapid detection within git repositories. TruffleHog offers deeper scanning across git, S3 buckets, Docker images, and Slack, featuring credential verification to confirm active leaks, making it suitable for CI/CD pipelines. Most teams utilize both tools for comprehensive secret protection.
Secrets
2026-04-17 2026Rafter: detect-secrets vs gitleaks vs TruffleHog
Library comparing `detect-secrets`, `git-secrets`, `gitleaks`, and `TruffleHog` for detecting leaked secrets. `git-secrets` is basic and AWS-focused. `detect-secrets` uses plugins and a baseline for brownfield repos, but has a higher false positive rate. `gitleaks` offers broad built-in coverage and fast scanning with 150+ rules. `TruffleHog` distinguishes itself by verifying found secrets via API calls, significantly reducing false positives by confirming active credentials.
Secrets
2026-04-11 2026How TruffleHog Verifies Secrets
Library detailing how TruffleHog verifies secrets, moving beyond simple entropy and regex checks. It explains the challenges in programmatically confirming API key validity by testing various endpoints like Doppler's `/v3/me`, handling diverse HTTP responses (including rate limits and error codes), and adapting to API changes and new key types. The library also covers complex verification for database credentials and emphasizes the community's role in maintaining TruffleHog's accuracy and low false-positive rates.
Secrets
2026-04-10 2026Secret Scanner Comparison: Finding Your Best Tool
Secret Scanner Comparison: Finding Your Best Tool
Secrets
2026-04-10 20266 Effective Secret Scanning Tools
Library for automated secret scanning that identifies and protects sensitive information like API keys and database credentials exposed in codebases, logs, or configuration files. It supports detection of various secret types, integrates with development workflows and CI/CD pipelines for early vulnerability detection, and provides actionable remediation insights. Specific tools mentioned include Legit Security, GitGuardian, AWS Secrets Manager, TruffleHog, Doppler, and GitLeaks.
Secrets
2026-04-10 20268 Best Secret Scanning Tools (2026)
Library for detecting hardcoded credentials, API keys, and tokens. It highlights tools like Gitleaks for pre-commit blocking, TruffleHog for live credential verification, and detect-secrets for legacy codebases. GitGuardian is noted as a leading managed platform, offering real-time monitoring and collaboration tool scanning. The library emphasizes the importance of early detection to prevent data breaches and account takeovers, contrasting the cost of pre-commit remediation with post-commit incident response.
Secrets
2026-04-10 2026Best Secret Scanning Tools in 2025
Library for detecting hard-coded secrets in code, configurations, and cloud infrastructure. It utilizes pattern recognition, entropy checks, and AI to identify sensitive data like API keys and passwords, aiming to prevent data breaches by automating detection and remediation. Notable features include context-aware detection correlating secrets with other vulnerabilities, one-click remediation for many secret types, and integration into developer workflows via IDE extensions and pre-commit hooks. The library supports broad scanning across Git repositories, container images, and cloud environments, offering a free tier for basic use.
Secrets
2026-04-03 2026TruffleHog - Find, Verify, and Analyze Leaked Credentials
Tool for discovering, classifying, validating, and analyzing leaked credentials. TruffleHog scans Git, Jira, Slack, Confluence, Microsoft Teams, SharePoint, S3 buckets, GCS, and Docker images for over 800 secret types, including API keys and database passwords. It can verify if secrets are live and enrich findings by determining resource access and permissions. TruffleHog includes protections against malicious Git configurations, addressing CVE-2025-41390.
Secrets
2022-03-17 2022Favorite tweet by @0x1shu
Favorite tweet: 🧙‍♂️Git Secrets Leaks Simplified by @sec_r0 ✨ In this flyer, you'll learn about how git works and the reason behind the git secrets leaks. Download the flyer: https://t.co/zMruBpl6c4 ...
Bug Bounty
2021-09-20 2021TruffleHog The Chrome Extension
Tool for detecting API keys and other secrets like `.git` directories and `.env` files within JavaScript code and client-side applications. It leverages permissive CORS headers from services like AWS to identify instances where credentials might be inadvertently exposed, as demonstrated by an example on weather.com. The extension can be side-loaded while awaiting review on the Google Extension Store.
Secrets

amass github.com/owasp-amass #

12 resources across 2 topics: Bug Bounty, Recon.

DateResourceTopics
2026-04-17 2026Complete Guide to Amass Tool (2025 Edition)
Library for comprehensive Amass recon and subdomain enumeration, covering installation on Kali Linux, Termux, and Windows WSL. It details Amass modules like Enum, Intel, Viz, Track, and DB, and provides basic usage examples for discovering subdomains, mapping DNS, and performing passive and active recon. The guide also includes pro tips for bug bounty hunters and installation via GitHub binary.
Recon
2026-04-10 2026Amass Cheat Sheet: 70+ Commands for Recon & Bug Bounty
Cheatsheet of 70+ Amass commands for reconnaissance and bug bounty hunting, detailing installation on Kali Linux, beginner and advanced techniques, and real penetration testing scenarios. This resource helps cybersecurity professionals discover subdomains, exposed infrastructure, and attack surfaces by leveraging open-source intelligence, DNS queries, and brute force methods. It also covers Amass's legal usage, its inclusion in Kali Linux, and alternatives like Subfinder and Sublist3r for comprehensive domain enumeration.
Recon
2026-04-06 2026Using OWASP Amass with Netlas Module
Library for reconnaissance and attack surface mapping, OWASP Amass integrates with the Netlas module. This guide details Amass installation via pre-built packages, source compilation, or Homebrew, and its configuration to leverage Netlas API keys within `datasources.yaml` for enhanced subdomain enumeration. Users can then execute `amass enum -d <domain> -include Netlas` to specifically query Netlas data or `amass enum -d <domain> -o <output_file>` to combine Netlas with other configured sources.
Recon
2026-04-03 2026How to Use Amass for Subdomain Enumeration and Recon Like a Pro
Library for comprehensive subdomain enumeration and attack surface discovery. Amass employs passive OSINT techniques, leveraging Certificate Transparency logs, Shodan, Censys, and public datasets, alongside active methods like DNS brute-forcing, permutations, and scraping. It supports DNS resolution and validation, brute-forcing with custom wordlists, reverse WHOIS and ASN lookups, and infrastructure mapping via graph databases, enabling visualization with `amass viz` and change detection with `amass track`.
Recon
2025-08-14 2025amass — Automated Attack Surface Mapping | Daniel Miessler
Tool for mapping attack surfaces, amass automates information gathering across multiple dimensions, integrating data from DNS enumeration, scraping various search engines, certificate transparency logs, and numerous APIs. It offers subcommands like `intel` for initial reconnaissance, `enum` for subdomain discovery and attack surface mapping, `viz` for visualizing results (including D3 and Maltego formats), `track` for historical analysis, and `db` for database management. Amass prioritizes diverse input sources and consistent developer attention, making it a robust solution for both offensive and defensive security operations.
Bug Bounty
2021-10-28 2021Haklukes Guide to AmassHow to Use Amass More Effectively for Bug Bounties
Haklukes Guide to AmassHow to Use Amass More Effectively for Bug Bounties
Bug BountyRecon
2021-10-28 2021OWASP Amass - An Extensive Tutorial
Library for passive and active reconnaissance, Amass facilitates subdomain discovery and external attack surface mapping using over 80 data sources. Its three subcommands, `intel`, `enum`, and `db`, support techniques like brute-forcing, DNS zone transfers, and certificate transparency log analysis, with findings stored in a graph database.
Recon
2021-10-28 2021Amass/config.ini at master OWASP/Amass
Amass/config.ini at master OWASP/Amass
Recon
2021-10-28 2021OWASP Amass - Users' Guide
Library for internet exposure investigation; this guide details OWASP Amass tool usage for subdomain enumeration via DNS and network mapping. It covers basic commands like `amass enum -d example.com` and advanced options including active enumeration (TLS certificates, zone transfers, web crawling) with `amass enum -active -d example.com`, passive data source utilization with `amass enum --passive -d example.com`, and Docker integration. The guide also explains configuration file management, API key storage, graph database persistence (file-based or PostgreSQL), and how findings from previous enumerations are leveraged.
Recon
2021-10-28 2021OWASP/Amass
Library for network asset discovery and attack surface mapping. This entry details installation instructions for Amass across various platforms including macOS (resolving "unidentified developer" warnings), Docker, Go compilation, Homebrew, FreeBSD, Kali Linux, NixOS, Gentoo, and Pentoo. It covers building Docker images, persisting graph databases, utilizing wordlists, and compiling from source with Go 1.18+.
Recon
2021-10-28 2021How to Use OWASP Amass: An Extensive Tutorial
Library for continuous subdomain discovery and external attack surface mapping, OWASP Amass offers multiple subcommands: `intel` for open-source intelligence gathering, `enum` for DNS enumeration and network mapping, `viz` for visualizing results, `track` for monitoring changes, and `db` for manipulating the graph database. It supports numerous data sources and techniques, including WHOIS, certificate transparency logs, DNS zone transfers, and brute-forcing, making it a comprehensive tool for penetration testers and security researchers.
Recon
2019-11-12 2019amass — Automated Attack Surface Mapping | Daniel Miessler
Tool for automated attack surface mapping, `amass` gathers information across multiple dimensions, leveraging various input sources like DNS enumeration, scraping from search engines (Baidu, Bing, Google), certificate transparency logs (Censys, Crtsh), APIs (Shodan, VirusTotal), and web archives. Its modules include `intel` for information gathering, `enum` for attack surface mapping, `viz` for visualization, `track` for historical data, and `db` for database manipulation. Examples showcase finding organizations via `-org` and discovering domains within CIDR ranges using `-cidr`.
Bug Bounty

Frida frida.re #

12 resources across 1 topic: Mobile.

DateResourceTopics
2026-04-22 2026Reverse engineering and modifying Android apps with JADX and Frida
Library for reverse engineering and modifying Android applications, utilizing JADX for code extraction and Frida for dynamic instrumentation. This resource details how to decompile APKs, analyze Java source code generated by JADX, and write custom Frida scripts to bypass security measures like certificate pinning, enabling traffic interception with tools like HTTP Toolkit. It covers techniques applicable to understanding and altering app behavior beyond standard certificate pinning implementations.
Mobile
2026-04-22 2026Bypassing iOS Frida Detection with LLDB and Frida
Writeup details bypassing iOS Frida detection using LLDB and Frida. The process involves jailbreaking an iPhone, setting up development tools like `libimobiledevice`, `frida-tools`, and LLDB, and then using `debugserver` for remote debugging. The author demonstrates how to find and breakpoint `FridaInTheMiddle.systemSanityCheck()` with LLDB to bypass detection, trace the `dummyFunction(flag:)` Swift function using `frida-trace` to get its mangled name, and finally hook this function with a Frida script to intercept and decode the Swift string argument, ultimately revealing the flag.
Mobile
2026-04-22 2026frida-interception-and-unpinning: Scripts to MitM all HTTPS traffic
Library of Frida scripts automates HTTPS MitM interception on mobile devices by redirecting traffic to a proxy, injecting CA certificates into trust stores, and patching certificate pinning and transparency checks. It also handles fallback patching for obfuscated certificate pinning on Android, disables root/jailbreak detection, and blocks HTTP/3 connections. The scripts can be used independently or together to intercept HTTP(S) traffic on Android and iOS.
Mobile
2026-04-16 2026Frida's Impact on Mobile Security and How to Fight Back
Frida's Impact on Mobile Security and How to Fight Back
Mobile
2026-04-16 2026From an Android Hook to RCE: $5000 Bounty
From an Android Hook to RCE: $5000 Bounty
Mobile
2026-04-11 2026Frida CodeShare: iOS Jailbreak Detection Bypass
Frida CodeShare: iOS Jailbreak Detection Bypass
Mobile
2026-04-11 2026iOS Jailbreak Detection Bypass with Frida - Full Guide
Library for bypassing iOS jailbreak detection using Frida. This guide details how to leverage Corellium's virtualized platform to identify and hook specific methods within applications like DVIA-2. It covers setup, class and method enumeration, and modifying boolean return values to circumvent detection mechanisms, enabling dynamic analysis and security testing of iOS applications.
Mobile
2026-04-10 2026Frida - OWASP Mobile Application Security Tool
Library for dynamic instrumentation, Frida enables JavaScript execution within native Android and iOS applications. It utilizes QuickJS for code injection via modes like Injected, Embedded, and Preloaded. Key APIs include Interceptor for inline hooking and Stalker for transparent, high-granularity tracing using JIT recompilation. Frida also offers specific APIs for Java and Objective-C interaction, alongside terminal tools such as `frida-ps` for process listing and `frida-trace` for function call tracing. Frida 17 introduces breaking changes, including the removal of bundled runtime bridges, necessitating separate installation via `frida-pm`, and API modifications for enhanced readability and performance.
Mobile
2026-04-03 2026Bypassing Certificate Pinning Using Frida: A Step-by-Step Guide
Walkthrough of bypassing certificate pinning on Android apps using Frida to enable Man-in-the-Middle (MitM) attacks. This guide details the setup of Frida, Android Studio, Mitmproxy, and an Android emulator, then demonstrates hooking into the ShipFast app's runtime to intercept HTTPS traffic, even when certificate pinning is implemented via the network security config file.
Mobile
2026-04-03 2026Hail Frida!! The Universal SSL Pinning Bypass for Android
Hail Frida!! The Universal SSL Pinning Bypass for Android
Mobile
2026-04-03 2026Four Ways to Bypass Android SSL Verification and Certificate Pinning | NetSPI
Library detailing four methods to bypass Android SSL verification and certificate pinning for man-in-the-middle attacks. Techniques include adding a custom CA to the trusted certificate store, overwriting packaged CA certificates, utilizing Frida to hook and bypass checks, and reversing custom certificate code, with tools like BurpSuite, ZAP, Frida, and Objection mentioned.
Mobile
2026-04-03 2026Defeating Android Certificate Pinning with Frida
Library for bypassing Android certificate pinning using Frida. This technique enables security researchers, developers, and privacy advocates to intercept and inspect HTTPS traffic from hyper-vigilant applications that employ custom certificate validation beyond the default system trust store. The library details how to leverage Frida scripts to modify application behavior dynamically, remove SSL pinning logic, and expose the actual network communication for analysis, particularly useful for apps like Twitter, N26, or BBVA.
Mobile

nmap nmap.org #

11 resources across 3 topics: AI, RCE, Recon.

DateResourceTopics
2026-04-17 2026Mastering Network Scanning: Nmap and Masscan Guide
Mastering Network Scanning: Nmap and Masscan Guide
Recon
2026-04-14 2026Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities
Snort rules detect exploitation attempts for Microsoft's April 2026 Patch Tuesday, which includes 165 vulnerabilities. Critical issues addressed by the rules include CVE-2026-23666 (.NET DoS), CVE-2026-33824 (Windows IKE RCE), CVE-2026-33826 (Active Directory RCE), and CVE-2026-33827 (Windows TCP/IP RCE). The update also covers several "more likely" to be exploited important vulnerabilities, such as CVE-2026-0390 (UEFI Secure Boot bypass) and CVE-2026-32201 (SharePoint spoofing).
RCE
2026-02-16 2026How I Built a 5-Path AI “Recon Beast” with n8n and Gemini (2026 Guide)
In 2026, the bug bounty landscape requires more than just speed, with AI enhancing attacker capabilities. The article discusses building a 5-Path AI "Recon Beast" using n8n and Gemini. This innovative approach leverages automation and AI to enhance reconnaissance processes for bug bounty hunting. The focus is on utilizing technology to improve efficiency and effectiveness in identifying vulnerabilities.
AI
2025-04-11 2025Nmap for Beginners: Easy Tips to Scan Networks Like a Pro
So, Think this :::: one night when you are trying to sleep , suddenly you imagine what’s happening on your network .. what devices are connected? What services are they running? {JUST 2 AM THOUGHTS…
Recon
2025-03-22 2025A Deep Dive into Nmap Scripts for Web Application Testing | by Khaleel Khan | System Weakness
A Step-by-Step Guide to Leveraging Nmap’s Most Advanced Scripts for Comprehensive Web Application Security Analysis This scenario showcases how an experienced penetration tester could leverage Nmap’s…
Recon
2025-01-29 2025GitHub - Chleba/netscanner: Terminal Network scanner & diagnostic tool with modern TUI
Tool for terminal-based network scanning and diagnostics featuring a modern TUI. It lists hardware interfaces, allows switching active interfaces for scanning and packet-dumping, scans WiFi networks and signal strength with charts, and performs IPv4 pinging of CIDRs with hostname, OUI, and MAC address resolution. The tool also supports IPv4 and IPv6 packet dumping (TCP, UDP, ICMP, ARP, ICMP6), pausing packet dumps, scanning open TCP ports, filtering packet logs, exporting scanned data to CSV, and traffic counting with DNS records. It relies on Ratatui and libpnet libraries.
Recon
2025-01-28 2025GitHub - aceberg/WatchYourLAN: Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history
Tool for lightweight network IP scanning, WatchYourLAN detects new hosts, monitors online/offline history, and logs all devices. It supports data export to InfluxDB2 or Prometheus for Grafana dashboards. While lacking built-in authentication, it can integrate with SSO tools like Authelia or ForAuth. Installation is available via Docker, with binary packages for various Linux distributions and architectures, and dependencies include `arp-scan` and `tzdata`.
Recon
2023-06-02 2023The Ultimate Guide to Port Scanning using Nmap | Nmap Notes
Library for port scanning with Nmap, detailing target specification, host discovery methods like ARP, ICMP, and TCP SYN pings, and port specification techniques. It covers service and version detection, along with leveraging the Nmap Scripting Engine (NSE) for advanced exploitation.
Recon
2023-04-20 2023Wazuh and NMAP integrarion for Network Vulnerability Scans
Wazuh and NMAP integrarion for Network Vulnerability Scans https://ift.tt/YLbjMJ9
Recon
2021-12-31 2021https://awesomeopensource.com/projects/go/nmap
https://awesomeopensource.com/projects/go/nmap
Recon
2021-09-13 2021Haklukes Guide to NmapPort Scanning is Just The Beginning
Haklukes Guide to NmapPort Scanning is Just The Beginning
Recon

gitleaks github.com/gitleaks #

10 resources across 1 topic: Secrets.

DateResourceTopics
2026-04-22 2026GitHub Secret Scanning 2026: New Patterns, Push Protection
Library for GitHub Secret Protection offers enhanced detection of leaked secrets with 28 new patterns across 15 providers, expanded push protection for 39 token types, and AI-powered generic password detection via Copilot. Available to GitHub Team plan customers at $19 per month per active committer, it includes validity checks and improved API visibility. This solution aims to prevent credential-related breaches, which cost an average of $4.88 million, by blocking pushes of sensitive information like Supabase service keys and Vercel API tokens before they reach repositories.
Secrets
2026-04-19 2026Pre-Commit Hooks for Secret Detection: Setup in 10 Minutes
Library for implementing pre-commit hooks to prevent secrets from entering Git history. It details the setup process for tools like gitleaks, detect-secrets, and TruffleHog, offering solutions for immediate detection and blocking of credential leaks. The library emphasizes catching secrets at the cheapest point in the lifecycle, preventing the need for costly history rewrites and incident response by integrating these tools seamlessly into the Git commit workflow.
Secrets
2026-04-19 2026Understanding Your Organization's Exposure to Secret Leaks — GitHub
Library for assessing an organization's exposure to secret leaks, highlighting that over 39 million secrets were detected on GitHub in 2024 alone. This resource details how secrets like API keys and passwords are leaked through repository commits or misconfigurations, referencing the $4.88 million average cost of credential compromise breaches and the 2022 LastPass breach. It provides methods for quantifying risk, including inventory audits and benchmarking against OWASP ASVS and NIST guidelines, and mentions GitHub's secret risk assessment tool for enterprise customers.
Secrets
2026-04-19 2026Exposed Developer Secrets Surge: AI Drives 34% Increase in 2025
Report detailing a 34% surge in exposed developer secrets during 2025, fueled by AI-assisted coding and expanded use of tools like Claude Code. GitGuardian's analysis highlights significant increases in leaked AI service credentials, including DeepSeek API keys, and identifies internal repositories as a six-fold greater risk. The report also notes that 28% of exposures occur outside code in platforms like Slack and Jira, with 64% of discovered secrets remaining unrevoked.
Secrets
2026-04-19 2026GitHub Found 39M Secret Leaks in 2024 — The GitHub Blog
Library for GitHub Advanced Security, featuring Secret Protection and Code Security, addresses the pervasive issue of exposed secrets, which led to 39 million leaks on GitHub in 2024. It emphasizes built-in push protection for public repositories and introduces affordable standalone products and a free point-in-time scan for organizations to identify and manage secret exposures effectively, partnering with vendors like AWS and Google Cloud Platform to enhance detection accuracy.
Secrets
2026-04-11 2026Secret Scanning in CI Pipelines using Gitleaks
Tool for integrating Gitleaks into GitLab CI pipelines for secret scanning. It details setting up a CI job to run Gitleaks against the OWASP Juice Shop application, demonstrating how to detect and prevent secret leaks like API keys, usernames, and secret keys from being committed. The entry also mentions the use of Git hooks as a pre-commit security measure.
Secrets
2026-04-11 2026Add a Local Gitleaks Pre-Commit Hook
Library for a local Gitleaks pre-commit hook that prevents accidental secrets from entering Git history. It utilizes files within `.git/` for a fast, easily removable safety net, supporting custom configurations via `.gitleaks.toml` and optional team-wide enforcement with Lefthook or GitHub Actions.
Secrets
2026-04-10 2026Top 8 Git Secrets Scanners in 2026
Library of eight Git secrets scanners, including Jit, Gitleaks, GitGuardian, HawkScan, AWS Git Secrets Scanner, Spectral, Trufflehog, and GitHub Secret Scanning, designed to detect and neutralize exposed sensitive data like API keys and credentials within code repositories. These tools employ pattern-based and ML detection, custom rules, historical and pre-commit scanning, CI/CD integration, and remediation guidance to prevent data breaches and unauthorized access by shifting security left in the development lifecycle.
Secrets
2026-04-03 2026TruffleHog vs. Gitleaks: A Detailed Comparison
Library comparing TruffleHog and Gitleaks, popular secret scanning tools that identify hardcoded secrets like API keys and tokens within codebases and other environments. TruffleHog offers extensive scanning across S3 buckets and Docker images with advanced verification, while Gitleaks provides a lightweight, fast, and user-friendly experience focused on code repositories, excelling in CI environments. Both integrate into the SDLC to proactively detect and rectify leaked credentials, preventing unauthorized access and security breaches.
Secrets
2026-04-03 2026Gitleaks - Find Secrets with Gitleaks
Tool for detecting secrets like passwords, API keys, and tokens in git repos, files, and via stdin. Gitleaks supports scanning via `git`, `dir`, and `stdin` commands, and can be integrated as a pre-commit hook or GitHub action. It allows for baseline scanning to ignore old findings and custom rule configuration.
Secrets

ffuf github.com/ffuf #

8 resources across 4 topics: API Sec, Bug Bounty, Fuzzing, Recon.

DateResourceTopics
2026-04-22 2026FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters
Tool for web fuzzing: FFuF (Fuzz Faster u Fool) assists bug bounty hunters by rapidly discovering directories, files, and hidden parameters. It supports GET and POST requests, authenticated testing via cookies, recursive directory scanning, and allows customization of request delay, threading, and response code filtering. Installation involves obtaining the Go programming language and then using "go get" to install FFuF from its GitHub repository.
Recon
2026-04-11 2026Fuzzing Web Apps using FFUF: Complete Guide
Library for fuzzing web applications using FFUF, covering directory discovery, subdomain enumeration, virtual host fuzzing, multi-layer extension hunting, recursive scanning, authentication testing, and API endpoint discovery. It also details workflow optimizations like rate limiting and Burp Suite integration, while warning against common pitfalls such as unauthorized testing and aggressive scanning.
Fuzzing
2026-04-11 2026FFUF Mastery: Advanced Web Fuzzing
Library for advanced web fuzzing using FFuf, transforming standard workflows into an optimized offensive security methodology. It details sophisticated response matching techniques, practical attack scenarios leveraging HTTP response characteristics, and provides battle-tested command snippets and visual pipeline examples for immediate implementation in security testing. Techniques include response-pattern differential analysis, multi-vector fuzzing, layered match profiles, calibration for false positive reduction, content discovery with anti-false-positive profiles, and virtual host discovery.
Fuzzing
2025-08-14 2025A ffuf Primer | Daniel Miessler
Tool for command-line web attacks, ffuf emulates functionality similar to Burp Intruder and Dirbuster. This Go-based utility leverages input files to fuzz parts of URLs, including GET parameters and POST data, for discovering vulnerabilities like disallowed paths and credential stuffing. It offers extensive options for matching responses based on HTTP codes, line counts, or size, and can be used with wordlists such as curated.txt from the RobotsDisallowed project to enhance the likelihood of finding sensitive information.
Bug Bounty
2023-09-03 2023ffuf advanced tricks - ACCEIS
Library for advanced web application fuzzing, `ffuf` goes beyond simple directory enumeration. It supports injecting wordlists into URLs, GET/POST parameters, and HTTP headers, and can read from STDIN or use external generators like Radamsa. This resource details `ffuf`'s configuration file, enabling persistent settings for colorization, custom headers, proxy usage, and multiple simultaneous wordlists, enhancing its capabilities for penetration testing.
API SecFuzzing
2022-01-16 2022How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes
How I Found multiple SQL Injection with FFUF and Sqlmap in a few minutes
Recon
2022-01-10 2022ffuf - Fuzz Faster U Fool
Library for fast web fuzzing written in Go. `ffuf` supports fuzzing URLs, headers, and POST data using the `FUZZ` keyword, and can filter responses by size (`-fs`) or status code (`-fc`). It offers features like recursive scanning, maximum runtime limits (`-maxtime`, `-maxtime-job`), and integrates with mutators via `--input-cmd`, enabling complex fuzzing scenarios such as JSON payload generation with Radamsa. Prebuilt binaries are available, and installation can be done via Homebrew or `go install`.
FuzzingRecon
2021-02-16 2021A ffuf Primer | Daniel Miessler
Tool, ffuf, is a flexible CLI-based web attack utility written in Go, often compared to Burp Intruder on the command line. It excels at fuzzing by injecting input from wordlists into various parts of a web application, including URLs, GET parameters, and POST data. ffuf can emulate tools like Dirbuster and even perform password guessing, making it a versatile addition to a web tester's toolkit, especially when combined with curated wordlists like those found in RobotsDisallowed.
Bug Bounty

Shodan shodan.io #

8 resources across 3 topics: OSINT, Recon, SSRF.

DateResourceTopics
2026-04-22 2026Shodan and Censys for beginners: How to find more vulnerabilities
Guide for beginners on utilizing Shodan and Censys for vulnerability discovery, focusing on reconnaissance techniques. It details how to use specific search operators like `org`, `asn`, `http.status`, `ssl.cert.subject.CN`, `http.favicon.hash`, and `http.html` to identify exposed hosts, forgotten assets via expired certificates, and authentication panels. The guide also explains filtering by technologies such as PHP and finding directory listings.
Recon
2026-04-17 2026Beyond Google: Navigating the Hidden Internet with Shodan and Censys
Beyond Google: Navigating the Hidden Internet with Shodan and Censys
OSINT
2026-04-17 2026sarenka: OSINT tool (Shodan/Censys) (GitHub)
Tool for OSINT and attack surface discovery, SARENKA gathers information from Shodan, Censys, and Criminal IP, mapping CVEs to CWEs. It also retrieves local machine data, including installed software and network information, alongside utilities for hash calculation, Shannon entropy, and port scanning. Future plans include more cryptography tools and reconnaissance scripts.
OSINT
2025-09-21 2025Flask 3.1.1 SSRF Zero-Day Shodan dork exposed 500 targets 0day PoC (CWE-918) Full Article: nullsecurityx.codes/ssrf-vulnerabi Video: youtube.com/watch?v=Levx_p Responsible disclosure & defensive demo only. #infosec #vulnerability #SSRF #BugBounty
A zero-day vulnerability in Flask 3.1.1 related to SSRF was exposed through a Shodan dork, revealing 500+ potential targets. A proof of concept (PoC) for this vulnerability (CWE-918) was shared. The full article and a video demonstrating the issue were provided. The disclosure was done responsibly, and a defensive demo was included. The content emphasizes information security, vulnerability, SSRF, and Bug Bounty programs. The details can be found at nullsecurityx.codes/ssrf-vulnerabi and the video is available on YouTube.
SSRF
2025-09-21 2025New video: Flask 3.1.1 SSRF Zero-Day Shodan dork exposed 500 targets 0day PoC (CWE-918). Watch now youtube.com/watch?v=Levx_p Responsible disclosure & defensive demo only. #infosec #vulnerability #SSRF #BugBounty
A new video exposes a Flask 3.1.1 SSRF Zero-Day vulnerability using a Shodan dork that revealed 500+ targets with a 0day Proof of Concept (CWE-918). The content emphasizes responsible disclosure and includes a defensive demo. The video can be watched on YouTube. The focus is on information security, vulnerability, SSRF, and Bug Bounty programs.
SSRF
2025-09-21 2025PREMIERE TONIGHT: Flask 3.1.1 SSRF Zero-Day (CWE-918) 8:00 PM (03) In this video: Discover 500 potential targets via Shodan dork PoC demo Turn on notifications so you dont miss it! Watch here: youtube.com/watch?v=Levx_p #BugBounty #CyberSecurity #SSRF
A video premiering tonight at 8:00 PM showcases a Flask 3.1.1 SSRF Zero-Day vulnerability (CWE-918). The content includes a demonstration of discovering 500 potential targets using Shodan dork. Viewers are encouraged to turn on notifications to not miss the premiere. The video link is provided for watching. The focus is on Bug Bounty, Cybersecurity, and SSRF.
SSRF
2025-04-04 202510 Rare and Worthy Websites and Services for Security Professionals
While platforms like Shodan, OWASP, and VirusTotal are staples for security professionals, there are many lesser-known websites and services that offer equally valuable tools and resources. These…
OSINT
2024-12-14 2024🚀 Introducing ShodanSpider v2: Your Ultimate Free Tool for CVE Searching and Shodan Data Analysis…
In today’s fast-paced cybersecurity world, staying ahead of vulnerabilities is critical. ShodanSpider v2 takes your security research to…
Recon

Snyk snyk.io #

7 resources across 5 topics: golang, Secrets, SSRF, Supply Chain, XSS.

DateResourceTopics
2026-04-17 2026What is a Software Bill of Materials (SBOM)? (Snyk)
Library for generating and managing Software Bills of Materials (SBOMs), providing formal records of software components and their supply chain relationships. SBOMs enhance transparency, aid in vulnerability management, and support regulatory compliance, especially for software sold to the federal government as mandated by Executive Order 14028. Standards like SPDX, SWID, and OWASP CycloneDX are supported, enabling detailed analysis of dependencies, licenses, and potential exploits, complementing efforts like SLSA for supply chain integrity.
Supply Chain
2026-04-03 2026Why 28 Million Credentials Leaked on GitHub in 2025 | Snyk
Library for detecting and preventing leaked secrets, including API keys, database passwords, cloud IAM credentials, and AI service keys. It addresses accidental commits to Git, insecure .env file practices, supply chain attacks via malicious packages like Shai-Hulud and compromised versions of TruffleHog, and leaks through non-code surfaces such as Slack, Jira, and Docker Hub. The library also highlights the growing risk from AI-assisted development and MCP server credentials, differentiating its secret scanning capabilities from SAST tools by emphasizing the analysis of full Git history, including deleted files.
Secrets
2025-08-14 2025Go Security cheatsheet | Snyk Blog
Cheatsheet detailing eight Go security best practices for developers, emphasizing the use of Go Modules for dependency management and scanning dependencies for CVEs with tools like Snyk. It covers employing Go's standard crypto packages, utilizing `html/template` to prevent XSS attacks, exercising caution with subshelling, `unsafe`, and `cgo`, using reflection sparingly, and minimizing container attack surfaces.
2025-08-14 2025What is SSRF (server-side request forgery)? | Tutorial & examples | Snyk Learn
Tutorial on Server-Side Request Forgery (SSRF) vulnerabilities, detailing how attackers can make arbitrary outbound requests from a server to access internal resources or cloud metadata. It demonstrates exploiting SSRF in a social app by reaching localhost and the AWS metadata endpoint (169.254.169.254), and discusses pivoting into internal networks, referencing CVE-2021-26084. The tutorial also covers prevention techniques like allowlisting and reconsidering dynamic request needs, noting SSRF's inclusion in the OWASP Top 10.
SSRF
2025-07-23 2025New #CVE Record: CVE-2025-8020 All #Snyk versions of the package private-ip are #vulnerable to Server-Side Request Forgery (#SSRF) where an attacker can provide an IP or #hostname that resolves to a #multicast IP address (224.0.0.0/4) which is not included as part of the private
The content discusses a new CVE record, CVE-2025-8020, indicating that all Snyk versions of the package private-ip are vulnerable to Server-Side Request Forgery (SSRF). This vulnerability allows an attacker to input an IP or hostname that resolves to a multicast IP address (224.0.0.0/4), not included in the private IP range. This poses a security risk.
SSRF
2024-07-22 2024DOM Based XSS | Tutorial & Examples | Snyk Learn | Snyk Learn
Tutorial on DOM XSS vulnerabilities, explaining how attackers manipulate the Document Object Model with client-side code injected via user-controllable sources like `eval()`, `document.write()`, or `innerHTML` sinks. It demonstrates exploiting a personalized profile color feature by escaping URL query parameters and recommends mitigating this by directly assigning color values to `document.body.style.color`, sanitizing input with libraries like `node-esapi`, or employing Content Security Policy (CSP) with nonces.
XSS
2022-02-21 2022Go Security cheatsheet | Snyk Blog
Cheatsheet detailing eight Go security best practices for Go developers. It covers using Go Modules for dependency management and scanning dependencies for CVEs with tools like Snyk. The resource recommends using Go's standard crypto packages and `html/template` to prevent XSS attacks. It also advises caution with subshelling, the `unsafe` package, and `cgo`, while recommending sparing use of reflection. Finally, it touches on minimizing container attack surfaces.

Trivy trivy.dev #

6 resources across 2 topics: Secrets, Supply Chain.

DateResourceTopics
2026-04-18 2026Trivy Supply-Chain Attack: Trusted Scanner Compromised Rotate CI/CD Secrets Now
Library for securing CI/CD pipelines against supply-chain attacks, particularly concerning the Trivy scanner compromise (CVE-2026-33634, GHSA-69fq-xp46-6×23). The library details techniques for mitigating risks associated with compromised scanning tools, including mandatory secret rotation, auditing pipeline runs, pinning GitHub Actions tags to immutable SHAs, enforcing least-privilege for runners, and increasing monitoring. It highlights how attackers exploit tag mutability and privileged scanner access to steal credentials and access cloud environments.
Supply Chain
2026-04-15 2026GitHub Actions Supply Chain Attack: Trivy Breach & Workflow
Library detailing the GitHub Actions supply chain attack targeting the Trivy security scanner, where attackers leveraged misconfigured workflows and compromised credentials. This campaign, initially led by Hackerbot-claw and later by the TeamPCP group, resulted in code execution, token exfiltration, malicious artifact injection into Trivy's VSCode extension, and force-pushing of version tags. The attacks later expanded to compromise NPM packages and the Checkmarx AST GitHub Action, highlighting the pervasive risks of insecure CI/CD pipelines.
Supply Chain
2026-04-06 2026CERT-EU Confirms Trivy Supply Chain Attack Led to Credential Exposure
CERT-EU Confirms Trivy Supply Chain Attack Led to Credential Exposure
Secrets
2026-04-04 2026European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack
Writeup detailing the European Commission's data breach, confirming over 300GB of data theft from its AWS environment. Hackers exploited an API key compromised during the TeamPCP-led supply chain attack on Aqua Security's Trivy vulnerability scanner. The attackers leveraged tools like TruffleHog to discover secrets and exfiltrate data related to 71 clients of the Europa web hosting service, with the stolen information later appearing on the ShinyHunters leak site.
Supply Chain
2026-04-03 2026Open Source Security Tool Trivy Hit by Supply Chain Attack Prompting Urgent Industry Response
Tool Trivy was compromised in a supply chain attack, with malicious release v0.69.4 briefly distributed, exfiltrating sensitive data and executing malicious code. Attackers leveraged compromised credentials and manipulated release processes, impacting downstream systems and related tooling like GitHub Actions. This incident highlights the vulnerability of trusted open source scanners and CI/CD pipelines, prompting calls for artifact integrity verification, credential scoping, and zero-trust principles in software supply chains.
Supply Chain
2026-04-02 2026Trivy supply chain intrusion reportedly compromises Cisco source code
Library for identifying and mitigating supply chain risks, highlighted by the Trivy vulnerability scanner's role in a Cisco source code compromise. This incident involved threat actors leveraging illicit GitHub Action plugins to gain access to Cisco's build environment, steal credentials, and exfiltrate AWS keys. The attack resulted in the cloning of over 300 Cisco GitHub repositories, including sensitive AI-related code and data from government agencies and financial institutions, and points to potential further compromises from related LiteLLM and Checkmarx incidents.
Supply Chain

Wireshark wireshark.org #

6 resources across 4 topics: Burp, Python, RCE, Recon.

DateResourceTopics
2026-05-03 2026GitHub - SharonBrizinov/Holy-Grail-PCAP: "Holy Grail PCAP" is a capture file offering exceptional coverage across nearly all tcpdump/Wireshark encapsulation types and dissectors.
Library for comprehensive Wireshark dissector code coverage analysis and bug hunting, featuring the "Holy Grail PCAP," a meticulously crafted capture file. This library includes over 1,600 dissectors across 186 link-layer types, including Bluetooth, USB, and CAN bus. It utilizes tools like `wirecov` for coverage measurement and `wirefuzz` for targeted dissector fuzzing, enabling bug discovery, CI/CD regression testing, and stress testing of packet processing tools.
Burp
2026-05-01 2026Critical Wireshark Vulnerabilities Let Attackers Execute Arbitrary Code Via Malformed Packets
Critical vulnerabilities have been discovered in Wireshark, a popular network protocol analyzer, that could allow attackers to execute arbitrary code on a victim's system. These vulnerabilities stem from the program's handling of malformed packets, meaning specially crafted network data can be used to exploit the flaw. Successful exploitation could lead to complete compromise of the affected system. Users are advised to update Wireshark to the latest version to patch these serious security risks.
RCE
2026-05-01 2026Multiple Wireshark Flaws Allow Remote Code Execution via Malformed Packets
Multiple vulnerabilities in Wireshark, a popular network protocol analyzer, have been discovered. These flaws allow remote code execution when the software processes specially crafted packets. Attackers could exploit these vulnerabilities by sending malformed data to a Wireshark user, potentially compromising their system without any user interaction. The severity of these issues highlights the importance of keeping Wireshark updated to the latest version to mitigate these security risks.
RCE
2023-11-05 2023TrafficWatch - TrafficWatch A Packet Sniffer Tool Allows You To Monitor And Analyze Network Traffic From PCAP Files
TrafficWatch - TrafficWatch, A Packet Sniffer Tool, Allows You To Monitor And Analyze Network Traffic From PCAP Files https://ift.tt/c1tg2uv
Recon
2023-01-31 2023Creating an Advanced Network Packet Sniffer in Python: A Step-by-Step Guide
The content is a step-by-step guide on creating an advanced network packet sniffer using Python. It provides detailed instructions on how to build the sniffer tool, which can capture and analyze network packets for various purposes. The guide likely covers topics such as setting up the necessary libraries, capturing packets, analyzing packet data, and potentially implementing additional features for advanced functionality. Overall, the content aims to help readers understand the process of creating a network packet sniffer using Python through a structured and informative guide.
Python
2022-01-15 2022Capturing Network Traffic With Python And TShark
Capturing Network Traffic With Python And TShark
Python

MobSF github.com/MobSF #

5 resources across 1 topic: Mobile.

DateResourceTopics
2026-04-22 2026Reversing Android Apps: Bypassing Detection Like a Pro
Library for bypassing common Android app detection mechanisms like Frida, root checks, and SSL pinning. Techniques include utilizing Magisk DenyList, employing Frida codeshare scripts, attaching Frida after app launch, static analysis with Jadx to identify and patch detection code, using Objection's `patchapk` feature, dumping loaded classes, tracing method calls, reversing native JNI code, and patching SSL pinning with `apk-mitm` for network traffic analysis.
Mobile
2026-04-11 2026Mobile Security Framework - MobSF Documentation
Mobile Security Framework - MobSF Documentation
Mobile
2026-04-11 2026MobSF: Mobile Security Framework (GitHub)
Library for mobile application security, penetration testing, malware analysis, and privacy analysis on Android, iOS, and Windows Mobile. MobSF supports static analysis of APK, IPA, and APPX binaries, as well as dynamic analysis with instrumented testing, runtime data, and network traffic analysis for Android and iOS. It integrates with DevSecOps pipelines via REST APIs and CLI tools.
Mobile
2026-04-03 2026OWASP Mobile Top 10 and MobSF
Library for addressing the OWASP Mobile Top 10 risks, including M1 (Improper Credential Usage) with examples like hardcoded credentials and insecure transmission, M2 (Inadequate Supply Chain Security) concerning malware injection, M3 (Insecure Authentication/Authorization) detailing hidden service requests, M4 (Insufficient Input/Output Validation) leading to remote code execution, M5 (Insecure Communication) through lack of certificate inspection, M6 (Inadequate Privacy Controls) via improper log sanitization, M7 (Insufficient Binary Protections) exposing API keys, and M8 (Security Misconfiguration) from insecure default settings.
Mobile
2021-06-11 2021mobsfscan
Library for static analysis of Android and iOS source code, mobsfscan detects insecure patterns in Java, Kotlin, XML, Swift, and Objective C. It leverages MobSF static analysis rules, semgrep, and libsast, identifying vulnerabilities like CWE-295 Improper Certificate Validation and CWE-532 Insertion of Sensitive Information into Log File. Supported output formats include JSON, SARIF, SonarQube, and HTML, enabling integration into automated security assessment workflows.
Mobile

Caido caido.io #

4 resources across 2 topics: API Sec, Burp.

DateResourceTopics
2025-12-10 2025Web App Hacking: Finding Web App Vulnerabilities with Caido Scanner
Caido just became a serious Burp killer. Scanner plugin auto-detects vulns as you browse + launches targeted attacks on suspicious endpoints: https://t.co/wkiXeRK5CU
Burp
2025-12-03 2025Web App Hacking: Finding Web App Vulnerabilities with Caido Scanner
Caido just became a serious Burp killer. Scanner plugin auto-detects vulns as you browse + launches targeted attacks on suspicious endpoints: https://t.co/GqmmOXsL75 @three_cube
Burp
2023-10-04 2023A lightweight web security auditing toolkit
Toolkit for web security auditing that enhances manual testing with AI and teamwork. Caido integrates with LLM providers like Anthropic, Google, and OpenAI through OpenRouter, enabling AI-powered plugins and programmatic access via its Client SDK. Features include autonomous agents for payload generation and task execution, precise request/response searching with HTTPQL, and ad-hoc automation via a node-based system. The platform boasts over 6,000 active users, 54+ community plugins, and a Discord community of 4,500+ members.
Burp
2023-07-19 2023Web App Hacking with Caido.io
Web App Hacking with Caido.io https://www.youtube.com/watch?v=lW-u_2EByT4
API SecBurp

mitmproxy mitmproxy.org #

4 resources across 3 topics: golang, GraphQL, Python.

DateResourceTopics
2026-01-17 2026pwviptbl/ProxyHunter: Aplicação Python com interface gráfica que permite configurar regras de interceptação para modificar parâmetros de requisições HTTP. Quando o navegador envia uma requisição para uma rota configurada, o proxy intercepta, modifica apenas os parâmetros especificados e encaminha a requisição mantendo todos os outros parâmetros originais.
Tool that intercepts HTTP requests to modify specific parameters. ProxyHunter is a Python application with a graphical interface that allows users to configure interception rules for HTTP requests. It intercepts requests to configured routes, modifies only specified parameters, and forwards the request while preserving all other original parameters. Features include a GUI, multiple rule configuration, GET and POST support, individual rule activation/deactivation, JSON persistence, configurable port, manual interception, WebSocket support, an advanced Intruder, and a vulnerability scanner detecting SQL Injection, XSS, CSRF, Path Traversal, and exposed sensitive information.
Python
2025-11-24 2025A Terminal client for HTTP/GraphQL/gRPC with support for SSH tunnels, WebSockets, SSE, workflows, profiling, OpenAPI and response diffs.
#golang https://t.co/sDSO3DWkkl
GraphQL
2024-11-29 2024Python Twisted proxy - how to intercept packets
Library for intercepting and modifying HTTP request and response bodies using Python's Twisted framework. Demonstrates a basic proxy setup using `twisted.web.proxy` and `twisted.internet.reactor`, enabling developers to inspect and alter data as it flows through the proxy. The provided code snippet serves as a starting point for building custom HTTP proxy functionalities.
Python
2021-01-22 2021projectdiscovery/proxify: Swiss Army knife Proxy tool for HTTP/HTTPS traffi
Tool: proxify is a Swiss Army knife proxy for rapid HTTP/HTTPS traffic manipulation. It supports request/response dumping, filtering, and manipulation via a DSL language, and can act as an upstream HTTP or SOCKS5 proxy. Features include TLS MITM support, an embedded DNS server, plugin support for protocol decoding, and the ability to replay dumped traffic into Burp Suite. Proxify can intercept non-HTTP traffic and supports invisible and thick client proxying.

Postman postman.com #

4 resources across 2 topics: API Sec, Bug Bounty.

DateResourceTopics
2025-02-10 2025GitHub - usebruno/bruno: Opensource IDE For Exploring and Testing Api's (lightweight alternative to postman/insomnia)
Library for API exploration and testing, Bruno offers a privacy-focused, offline-first alternative to Postman and Insomnia. It stores API collections in local filesystem folders using the Bru markup language, facilitating collaboration via Git or other version control systems. Bruno is available for Mac, Windows, and Linux, with installation options including binary downloads and package managers like Homebrew, Chocolatey, Scoop, Snap, Flatpak, and Apt.
API Sec
2024-12-13 2024Server SSL certificate verification - HTTPie 3.2.4 (latest) docs
Library for interacting with HTTP services from the command line, designed for human-friendly testing and debugging. It supports intuitive syntax, formatted output, JSON, forms, uploads, HTTPS, proxies, authentication, custom headers, persistent sessions, downloads, and a plugin system. Installation instructions are provided for various package managers and operating systems, including standalone executables. The documentation details usage for custom methods, headers, JSON data, form submissions, offline requests, authentication, file uploads/downloads, sessions, and URL parameters.
API Sec
2022-06-09 2022Favorite tweet by @fardeenahmed411
Favorite tweet: API Bug-Bounty Tools Check list (Part - 1) - Postman (It is like Burpsuite for API) - APISec - AppKnox - Synopsis API Scanner - Data Theorem API Secure #cybersecuritytips #bugbountyti...
API SecBug Bounty
2021-08-25 2021API Testing with HTTPie
API Testing with HTTPie
API Sec

BeEF beefproject.com #

3 resources across 3 topics: Bug Bounty, Recon, XSS.

DateResourceTopics
2023-04-02 2023How to Hack Web Browsers with BeEF Framework
How to Hack Web Browsers with BeEF Framework https://ift.tt/r8zkdW9
XSS
2022-05-11 2022Favorite tweet by @Nickieyey
Favorite tweet: Top XSS (Cross Site Scripting) Tools : 1) BeeF 2) BlueLotus_XSSReceiver 3) xssor2 4) Xsser-Varbaek 5) Xsser-Epsylon 6) Xenotix #pentesting #ethicalhacking #cybersecurity #CyberSec #we...
Bug BountyXSS
2021-12-06 2021How to run BeEF behind an nginx reverse proxy with SSL correctly
Library for configuring BeEF behind an nginx reverse proxy with SSL, addressing "Blocked Mixed Active Content" errors. It details BeEF's `config.yaml` settings for `allow_reverse_proxy`, `public`, and `public_port`, along with Nginx `proxy_pass` directives to correctly handle HTTPS requests and ensure BeEF hooks function on secure pages.
Recon

dirsearch github.com/maurosoria #

3 resources across 3 topics: AuthN, Recon, SSRF.

DateResourceTopics
2025-08-14 2025My First Case of SSRF Using Dirsearch | by Mba-oji Chiagoziem | Medium
The content appears to be a personal account titled "My First Case of SSRF Using Dirsearch" by Mba-oji Chiagoziem on Medium. The author likely shares their experience encountering a Server-Side Request Forgery (SSRF) vulnerability while using the tool Dirsearch. The article may delve into the details of how the SSRF vulnerability was discovered, the implications of such a vulnerability, and potentially offer insights or lessons learned from the experience.
SSRF
2023-10-04 2023Directory Listing
Directory Listing https://ift.tt/hdv6BCV
Recon
2023-09-03 2023GitHub - dirkjanm/adidnsdump: Active Directory Integrated DNS dumping by any authenticated user
Library for Active Directory Integrated DNS dumping, allowing any authenticated user to enumerate and export all DNS records in Domain or Forest DNS zones for internal network reconnaissance. It requires impacket and dnspython for functionality and can be installed via pip or from Git. The tool supports direct network use or operation via an implant using proxychains with the `--dns-tcp` option.
AuthN

semgrep semgrep.dev #

3 resources across 3 topics: Python, RCE, Supply Chain.

DateResourceTopics
2026-04-16 2026tj-actions/changed-files Compromised - Semgrep
Semgrep rule for detecting compromised GitHub Actions, specifically targeting `tj-actions/changed-files` and `reviewdog/action-setup@v1`. This action, `tj-actions/changed-files`, was previously compromised and may have leaked secrets. The rule helps identify usages of these actions within CI pipelines, enabling prompt remediation and security audits. Users can run this rule locally or within the Semgrep AppSec Platform in blocking mode to prevent further compromise.
Supply Chain
2026-04-03 2026Insecure Deserialization in Python | Semgrep
Library for detecting insecure deserialization vulnerabilities in Python code, focusing on the dangers of libraries like `pickle`, `dill`, `jsonpickle`, and `shelve` when processing untrusted input. It highlights how these libraries can lead to remote code execution and provides examples of exploitation, including a demonstration with `pickle.dumps` and `os.system`. The library's rules identify data flow from untrusted sources to sensitive deserialization functions, offering practical recommendations to avoid risks such as avoiding `pickle` for untrusted data, using safer alternatives like JSON or `PyYAML`'s `safe_load`, and integrating Semgrep scans into CI pipelines. Specific mitigations for Django, NumPy, and PyTorch are also mentioned.
Python
2021-12-13 2021Semgrep
Semgrep
RCESupply Chain

subfinder github.com/projectdiscovery #

3 resources across 2 topics: Bug Bounty, Recon.

DateResourceTopics
2026-04-19 2026SubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025
SubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025
Recon
2026-04-03 2026Subfinder Complete Guide 2025: Subdomain Enumeration Mastery
Library for stealthy subdomain enumeration, Subfinder gathers subdomains from passive online sources to map an organization's attack surface. It supports extensive configuration options, including selecting sources, filtering patterns, using custom resolvers, and integrating API keys for services like BinaryEdge, Censys, GitHub, Shodan, and VirusTotal. Subfinder can output results in plain text or JSON, and it integrates well with other ProjectDiscovery tools like httpx and nuclei for comprehensive reconnaissance.
Recon
2019-08-20 2019Automated monitoring of subdomains for fun and profit — Release of Sublert
"Sublert" is a tool released for automated monitoring of subdomains for bug bounty programs. The bug bounty industry is rapidly growing, leading to fierce competition among programs. Sublert aims to assist in identifying security vulnerabilities in subdomains, potentially leading to financial rewards for bug hunters.
Bug Bounty