cypher-injection-scanner
Cypher scanner
An extension for Burp Suite to detect and alert on potential Cypher code injection vulnerabilities in Neo4j databases
Burp Suite Extension that detects Cypher code injection
5 stars
2 watching
8 forks
Language: Java
last commit: over 4 years ago burp-extensionscode-injectionneo4j
Related projects:
Repository | Description | Stars |
---|---|---|
| A Burp extension that scans application traffic for signs of vulnerabilities and potential attack targets | 41 |
| An extension for Burp Suite to automatically search for sensitive strings in HTTP messages | 44 |
| An extension for Burp Suite that identifies potential security vulnerabilities in web applications by analyzing endpoints, parameters, and generating custom target wordlists. | 1,278 |
| An extension that allows manual scanning of specific request regions in Burp Suite Pro | 10 |
| Automates identification of injection points in GWT requests for penetration testing purposes. | 13 |
| A tool to detect NoSQL injection vulnerabilities in web applications using a Java-based plugin for Burp Suite. | 23 |
| A tool to scan vulnerabilities in Log4J applications | 101 |
| An extension that allows modifying HTTP requests and responses with Python code to facilitate security testing of encrypted transactions | 22 |
| An extension for Burp Suite that scans for unknown classes of injection vulnerabilities using a novel approach | 643 |
| An extension that scans cloud storage services for vulnerabilities and identifies publicly accessible resources. | 42 |
| A Burp Suite extension to enhance scanning by injecting HTTP redirects into responses from specific APIs. | 0 |
| An extension for Burp Suite that automates passive detection of Shiro framework vulnerabilities. | 1,690 |
| A Java extension for Burp Suite allowing custom scanner checks in JavaScript. | 21 |
| An extension allowing Burp Suite scans to be pushed to the Nucleus platform for vulnerability analysis and reporting | 3 |
| An extension for Burp Suite that provides a structured approach to identifying and testing common vulnerability parameters. | 2,192 |