Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results. It allows you to send a large number of requests and analyze the results to identify potential vulnerabilities. It also provides features such as request filtering, request modification, and result analysis.
FEATURES
SIMILAR TOOLS
A framework for exploiting Android-based devices and applications
DueDLLigence is an open-source tool for identifying and analyzing DLL hijacking vulnerabilities in Windows applications, providing automated analysis and remediation guidance.
A tool for security researchers and penetration testers to automate the process of finding sensitive information on a target domain.
A powerful tool for hiding the true location of your Teamserver, evading detection from Incident Response, redirecting users, blocking specific IP addresses, and managing Malleable C2 traffic in Red Team engagements.
CrackMapExec (CME) - A tool for querying internal database for host and credential information in cybersecurity.
A post-exploitation framework designed to operate covertly on heavily monitored environments.
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
A tool that finds more information about a given URL or domain by querying multiple data sources.
Modular framework for pentesting Modbus protocol with diagnostic and offensive features.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.