burp-Collect500
HTTP collector
A tool to collect and potentially log HTTP 500 responses from Burp Suite
Burp plugin that collects all HTTP 500 messages
5 stars
3 watching
4 forks
Language: Python
last commit: almost 8 years ago Related projects:
Repository | Description | Stars |
---|---|---|
b4dpxl/burp-responsegrepper | An extension for Burp Suite that extracts and displays values from HTTP response bodies based on regular expressions. | 3 |
darklynx/request-baskets | A service to collect and inspect HTTP requests via RESTful API or web UI | 352 |
mwielgoszewski/burp-jython-tab | A tool for interacting with Burp Suite's HTTP client in Python. | 4 |
chopicalqui/turbodataminer | A tool for analyzing and modifying HTTP requests in Burp Suite using Python scripts | 54 |
crashgrindrips/burp-dump | A tool to export HTTP(S) requests and responses from BurpSuite to a file system in various log formats | 24 |
phlmox/burp_copy_as_ffuf_command | A tool to generate and copy FFUF commands to modify HTTP requests in Burp Suite | 1 |
anof-cyber/paraforge | An extension for Burp Suite to extract parameters and endpoints from requests to create custom wordlists for testing | 140 |
e1abrador/burp-headersnipper | Tool to simplify reporting by removing unnecessary headers from HTTP requests. | 22 |
hurricanelabs/machinae | A tool for collecting security-related data from public sites and feeds. | 504 |
faradayrf/aprs2influxdb | A tool for interfacing with APRS-IS servers and saving packet data to an InfluxDB database | 28 |
portswigger/copy-as-python-requests | A plugin that allows Burp Suite users to easily copy selected requests as Python code | 61 |
gdssecurity/deflate-burp-plugin | A Burp Proxy plugin that decompresses HTTP response content in ZLIB and DEFLATE formats | 13 |
gdssecurity/burpee | A Python interface to parse Burp Suite logs and extract request/response data | 36 |
n0kovo/burp-copy-headers-as-args | Copies request headers in the format used by various web scanning tools. | 5 |
burp-hash/burp-hash | Automates the process of identifying potential parameter values in hashed tokens by comparing hashes to observed data in an application. | 32 |