From e7b26d3f545eeda4a9a58ce6961beb0fbcb25496 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Sun, 9 Mar 2025 15:17:07 +0100 Subject: [PATCH] a --- src/pentesting-web/websocket-attacks.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/src/pentesting-web/websocket-attacks.md b/src/pentesting-web/websocket-attacks.md index 214a9416c..d199dc80c 100644 --- a/src/pentesting-web/websocket-attacks.md +++ b/src/pentesting-web/websocket-attacks.md @@ -86,6 +86,11 @@ You can use the **tool** [**https://github.com/PalindromeLabs/STEWS**](https://g - [**https://websocketking.com/**](https://websocketking.com/) it's a **web to communicate** with other webs using **websockets**. - [**https://hoppscotch.io/realtime/websocket**](https://hoppscotch.io/realtime/websocket) among other types of communications/protocols, it provides a **web to communicate** with other webs using **websockets.** +## Decrypting Websocket + +- [https://github.com/Anof-cyber/PyCript](https://github.com/Anof-cyber/PyCript) +- [https://github.com/Anof-cyber/PyCript-WebSocket/](https://github.com/Anof-cyber/PyCript-WebSocket/) + ## Websocket Lab In [**Burp-Suite-Extender-Montoya-Course**](https://github.com/federicodotta/Burp-Suite-Extender-Montoya-Course) you have a code to launch a web using websockets and in [**this post**](https://security.humanativaspa.it/extending-burp-suite-for-fun-and-profit-the-montoya-way-part-3/) you can find an explanation.