- IPRotate_Burp_Extension VS Osintgram
- IPRotate_Burp_Extension VS requests-ip-rotator
- IPRotate_Burp_Extension VS PayloadsAllTheThings
- IPRotate_Burp_Extension VS fireprox
- IPRotate_Burp_Extension VS dirsearch
- IPRotate_Burp_Extension VS burp-copy-as-ffuf
- IPRotate_Burp_Extension VS HackBar
- IPRotate_Burp_Extension VS osmedeus
- IPRotate_Burp_Extension VS Burp2Malleable
IPRotate_Burp_Extension Alternatives
Similar projects and alternatives to IPRotate_Burp_Extension
-
fireprox
AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation
-
requests-ip-rotator
A Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
Osintgram
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
-
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
Burp2Malleable
Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles
IPRotate_Burp_Extension reviews and mentions
-
Let's Talk About Two-Factor Auth
I rank Yubikey #1 because it is the easiest item to keep safe without sacrificing usability. Most people do not carry their Yubikey around with them everywhere so it can stay protected in your home. TOTP on the other hand is only as hardened as your cell phone is if it gets stolen from you. I once had a friend who knew I was a "hacker" ask me to hack her phone and she handed it to me. I assumed I'd open it, attempt to guess her pin and hand it back as we were eating dinner and I don't carry my laptop everywhere, but she didn't even have a lock on her phone. I went to her also unprotected Venmo app and showed her how easy it would be to send myself money. Now this was years ago and I'd say most people are smart enough to lock their devices but not all methods of device locking are created equal either so know that if you do choose to use TOTP it is only as secure as your phone is. Additionally, most TOTP codes are short (6 digits) whereas Yubikey's code is fairly verbose. If the application does not implement rate limiting in theory a savvy attacker could brute force TOTP. An application that only rate limits by IP could be beaten by someone using a tool like this: https://github.com/RhinoSecurityLabs/IPRotate_Burp_Extension.
-
Created a Python library to bypass IP-based rate limiting: python-requests-rotator :)
- Setting up RhinoSecurity's IPRotate Burp extension and then using Burp as your upstream proxy
Stats
The primary programming language of IPRotate_Burp_Extension is Python.