csrf

CSRF scanner

A tool to scan websites for Cross-Site Request Forgery (CSRF) vulnerabilities and provide protection in Burp Suite Pro.

CSRF Scanner Extension for Burp Suite Pro

GitHub

19 stars
4 watching
17 forks
Language: Java
last commit: over 6 years ago

Related projects:

Repository Description Stars
kathanp19/gaussrf A tool for identifying potential vulnerabilities in websites by fetching known URLs and filtering out ones with open redirects or SSRF parameters. 165
0xinfection/xsrfprobe A toolkit designed to test and exploit Cross-Site Request Forgery vulnerabilities in websites. 1,108
gand3lf/semgrepper An extension to Burp Suite that integrates Semgrep for vulnerability scanning and analysis 87
r0075h3ll/oralyzer A tool to identify vulnerabilities in web applications by probing for Open Redirections and other types of attacks. 753
justinas/nosurf Protects against Cross-Site Request Forgery (CSRF) attacks in web applications by verifying user input 1,589
asaafan/csurfer An extension that bypasses anti-CSRF tokens in web applications 18
wrvenkat/burp-multistep-csrf-poc An extension for Burp Suite that generates multi-step CSRF POCs from selected requests. 29
codewatchorg/burp-indicatorsofvulnerability A Burp extension that scans application traffic for signs of vulnerabilities and potential attack targets 41
mlcsec/asrenum-bof Tools to detect and exploit vulnerabilities in Windows Attack Surface Reduction (ASR) settings 138
codewatchorg/burp-yara-rules Provides Yara rules to identify malicious software in web applications 44
seisvelas/san-scanner An extension for Burp Suite that helps discover Subject Alt Names in SSL certificates 3
rip1s/ctfhelper A tool that helps solve web challenges by scanning sensitive files in web servers. 30
sh1yo/x8 Tools for discovering hidden parameters in web applications 1,691
vulnerscom/burp-vulners-scanner A tool that searches for vulnerabilities in web applications using an external API 834
mindpatch/lorsrf A tool designed to identify parameters in web applications that can be exploited for SSRF or out-of-band resource load attacks. 289