Uploader
File upload tester
A Burp extension tool to test for directory traversal attacks in insecure file uploads.
Burp extension to test for directory traversal attacks in insecure file uploads
5 stars
2 watching
6 forks
Language: Ruby
last commit: over 7 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| An efficient file upload system with features like dynamic image resizing and resumeable uploads over unreliable networks. | 203 |
| An extension for Burp Suite's web security testing tool that allows scripting and automation of requests and responses using Ruby. | 58 |
| An extension for Burp Suite that allows testing of ZIP file payloads by injecting and manipulating the content of uploaded files. | 70 |
| A library for building file upload functionality in Angular applications | 758 |
| A Burp extension tool designed to help identify authorization issues in web applications by automating request repetition and parameter value extraction. | 186 |
| An extension that allows modifying HTTP requests and responses with Python code to facilitate security testing of encrypted transactions | 22 |
| A plugin for Burp Suite that enables automated template generation and execution of security testing tools. | 1,202 |
| A plugin for file upload in React Native apps | 113 |
| Automates HTTP request testing and modification within Burp Suite to streamline authorization testing | 853 |
| An extension plugin for Burp Suite to facilitate chunked transmission | 1,945 |
| Detects target="_blank" values without "noopener" and "noreferrer" attributes to identify potential phishing vulnerabilities | 4 |
| An extension allowing Burp Suite scans to be pushed to the Nucleus platform for vulnerability analysis and reporting | 3 |
| Tools to facilitate security testing of applications with authorization tokens | 46 |
| A middleware that secures file uploads by scanning files for malicious content before they are processed by an application. | 74 |
| An extension for a web application security testing tool that identifies vulnerabilities and exploits HTTP requests for penetration testing. | 355 |