rbrown256
rbrown256
Many thanks for your analysis. I have a few queries if you're still interested in this project, but I guess not since it has been a few years. > then...
This looks like a worthwhile merge to me. Thanks for your contribution. @ticarpi any chance of merging this in?
Add --no-sandbox browser option when user is root and print inql.burp URL when browser doesn't start
**Describe the bug** Clicking `Extensions > InQL > Open in...` doesn't result in any action **To Reproduce** 1. Load `InQL.jar` into Burp Suite Pro 3. Load a Portswigger Academy GraphQL...
Add --no-sandbox browser option when user is root and print inql.burp URL when browser doesn't start
Thanks for bearing with me. I tried it on another Kali and it didn't work. However, it did work on MacOS. So then I tried on Kali but running as...
Add --no-sandbox browser option when user is root and print inql.burp URL when browser doesn't start
Perfect - unchecking the `Use Embedded Chromium` sorted this. I already have Firefox configured to run via Burp's proxy, so all good wrt `inql.burp` That would be the perfect solution...
The tool assumes you're using Burp Proxy on default settings. If not pass `-np` or `--noproxy` as a parameter, or set in `jwtconf.ini`
Either try CTRL+C a few times, or CTRL+Z then type `kill %`
Green means good for the attacker. Of course ignore `Prescan` and `Persistence check` lines.
@bensgith I used https://github.com/anojht/synology-cloud-sync-decrypt-tool in the end instead