A pure-python fully automated and unattended fuzzing framework.
Network protocol fuzzing for humans.
Differential testing and fuzzing of HTTP servers and proxies.
Collect HTTP or webhook requests and inspect them in a human-friendly way.
Easily test HTTP webhooks with this handy tool that displays requests instantly.
An HTTP toolkit for security research.
Fast Go application scanner.
A powerful and flexible HTTP reverse proxy.
Cross-platform post-exploitation HTTP/2 Command & Control server and agent.
Bypass IP source restrictions using HTTP headers.
A project for fuzzing HTTP/1.1 CL.0 Request Smuggling attack vectors.
Enhance the security and confidentiality of HTTP request handling within the Burp Suite.
HTTP-traceroute in Go.
Collection of Python classes for working with network protocols.
Set as many exfiltration, techniques that CAN be used to bypass various.
View and modify HTTP requests before they are sent.
Allows you to intercept and edit HTTP/HTTPS requests and responses.
Identify the operating system of a target host simply by examining captured packets.
Create a TCP circuit through validly formed HTTP requests.
Pwn a bastion webserver and create SOCKS proxies through the DMZ.
Weaponized web shell.
Web debugging proxy for MacOS, Windows, and Linux.
Simple HTTP listener for security testing.
Copy a Burp Suite request to a file or the clipboard as multiple programming languages functions.
HTTP fuzzer engine security oriented.
A tool to make socks connections through HTTP agents.
A network analyzer that make easy to extract informations about network traffic.
Burp Extension for copying requests safely.
A mini webserver with FTP support for XXE payloads.
Detect Vulnerable SSRF parameters.
Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.
Customisable and automated HTTP header injection.