Skip to content
/ 0x94TR Public

0x94TR Scanner Burp Suite Extension

Notifications You must be signed in to change notification settings

C0dak/0x94TR

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 

Repository files navigation

0x94TR

0x94TR Scanner Burp Suite Extension

  • GET-POST Error Based SQL Injection
  • GET-POST Blind SQL Injection
  • GET-POST Time Based SQL Injection
  • GET-POST Boolean Based SQL Injection
  • GET-POST Union Based SQL Injection
  • GET-POST Remote Command Execution
  • GET-POST PHP exec
  • GET-POST Local File Include
  • Header CRLF Injection
  • GET-POST Command Injection
  • GET-POST Open Redirect
  • GET-POST XSS
  • GET-POST LDAP Injection
  • GET-POST Xpath Injection
  • GET-POST Frame Injection
  • GET-POST SSI Injection
  • GET-POST Template Injection
  • HTTP Response Splitting
  • Blind Command Injection
  • Blind Remote Command Injection
  • Blind XPATH Injection
  • Header(Cookie/UserAgent) Injection

Requirements:
Burp Suite Professional, 2.7.0 standalone: http://www.jython.org/downloads.html
Manual installation:
'Extender'->'Options'
Click 'Select file' under 'Python environment'
Choose jython-standalone-2.7.0.jar
'Extender'->'Extensions'
Click 'Add'
Change 'Extension Type' to Python
Choose 0x94TR.py
Done!


watch the video

0x94TR Burp Suite Extension

About

0x94TR Scanner Burp Suite Extension

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published