
A Burp Suite extension that detects NGINX alias traversal vulnerabilities by analyzing HTTP traffic patterns to identify path traversal misconfigurations.

A Burp Suite extension that detects NGINX alias traversal vulnerabilities by analyzing HTTP traffic patterns to identify path traversal misconfigurations.
off-by-slash is a Burp Suite extension that identifies alias traversal vulnerabilities in NGINX configurations through automated analysis of HTTP requests and responses. The extension operates by examining web traffic patterns to detect potential path traversal issues that arise from NGINX alias directive misconfigurations. These misconfigurations can allow attackers to access files and directories outside of the intended web root. The tool integrates directly with Burp Suite's proxy functionality, enabling security professionals to test NGINX configurations at scale during web application assessments. It analyzes server responses to identify indicators of successful alias traversal attempts. The extension focuses specifically on NGINX server configurations and their potential security weaknesses related to file path handling and directory access controls.
Common questions about off-by-slash including features, pricing, alternatives, and user reviews.
off-by-slash is A Burp Suite extension that detects NGINX alias traversal vulnerabilities by analyzing HTTP traffic patterns to identify path traversal misconfigurations. It is a Vulnerability Management solution designed to help security teams with Misconfiguration.
off-by-slash is a free Vulnerability Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/bayotop/off-by-slash/ for download and installation instructions.
Popular alternatives to off-by-slash include:
Compare these tools and more at https://cybersectools.com/categories/vulnerability-management
off-by-slash is for security teams and organizations that need Misconfiguration. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Vulnerability Management tools can be found at https://cybersectools.com/categories/vulnerability-management
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
AI-powered automated penetration testing platform for vulnerability discovery
AI-powered automated penetration testing platform for web apps, APIs & GraphQL
Human-guided continuous pentesting platform with attack surface management