All Projects → joanbono → Gurp

joanbono / Gurp

Licence: Apache-2.0 license
Burp Commander written in Go

Programming Languages

go
31211 projects - #10 most used programming language
Makefile
30231 projects

Projects that are alternatives of or similar to Gurp

Burp Bounty Profiles
Burp Bounty profiles compilation, feel free to contribute!
Stars: ✭ 76 (+35.71%)
Mutual labels:  pentest, burpsuite
Burp Suite Error Message Checks
Burp Suite extension to passively scan for applications revealing server error messages
Stars: ✭ 45 (-19.64%)
Mutual labels:  pentest, burpsuite
Burp Suite Software Version Checks
Burp extension to passively scan for applications revealing software version numbers
Stars: ✭ 29 (-48.21%)
Mutual labels:  pentest, burpsuite
report-ng
Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.
Stars: ✭ 62 (+10.71%)
Mutual labels:  pentest, burpsuite
Pentest-Service-Enumeration
Suggests programs to run against services found during the enumeration phase of a Pentest
Stars: ✭ 80 (+42.86%)
Mutual labels:  pentest
PPN
Pentester's Promiscuous Notebook
Stars: ✭ 221 (+294.64%)
Mutual labels:  pentest
burp-copy-as-ffuf
Burp Extension that copies a request and builds a FFUF skeleton
Stars: ✭ 77 (+37.5%)
Mutual labels:  burpsuite
Spray365
Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to bypass Azure Smart Lockout and insecure conditional access policies.
Stars: ✭ 233 (+316.07%)
Mutual labels:  pentest
hack-scripts
scripts to setup pentesting system and use during pentest
Stars: ✭ 16 (-71.43%)
Mutual labels:  pentest
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+55.36%)
Mutual labels:  pentest
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+412.5%)
Mutual labels:  pentest
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+50%)
Mutual labels:  burpsuite
eslinter
Manual JavaScript Linting is a Bug
Stars: ✭ 47 (-16.07%)
Mutual labels:  burpsuite
HellgateLoader CSharp
Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
Stars: ✭ 73 (+30.36%)
Mutual labels:  pentest
Bifrost
Bifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-33.93%)
Mutual labels:  pentest
RPCScan
Tool to communicate with RPC services and check misconfigurations on NFS shares
Stars: ✭ 53 (-5.36%)
Mutual labels:  pentest
googleauthenticator
Burp Suite plugin that dynamically generates Google 2FA codes for use in session handling rules (approved by PortSwigger for inclusion in their official BApp Store).
Stars: ✭ 18 (-67.86%)
Mutual labels:  burpsuite
juumla
🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (+91.07%)
Mutual labels:  pentest
CVE-2021-41773 CVE-2021-42013
Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE
Stars: ✭ 20 (-64.29%)
Mutual labels:  pentest
Burp-AppSecFlow
The extension of Burp Suite for Conviso Platform aims to serve as an integration between them, making the life of an analyst easier, because he can now send vulnerabilities directly from Burp to the platform.
Stars: ✭ 36 (-35.71%)
Mutual labels:  burpsuite

Go Report Card

Requirements

  • BurpSuite Professional version v2.0.0beta or greater from PortSwigger

Enable the API under User Options > Misc > REST API.


Dependencies

go get -u -v github.com/joanbono/Gurp

Add rsrc to the $PATH to build Windows binaries using the icon.

Run make all to build binaries for Windows, Linux and Darwin.

To install the binary in your $GOPATH, run make install.


Binaries

Latest version available here.


Building

# macOS binary
make darwin

# Linux binary
make linux

# Windows binary
make windows

# Build all
make all

Usage

Refer to USAGE

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].