0xcite / fingerpingLinks
A security tool to fingerprint PNG libraries used by web applications
☆81Updated 6 years ago
Alternatives and similar repositories for fingerping
Users that are interested in fingerping are comparing it to the libraries listed below
Sorting:
- A regex based source code scanner.☆129Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- Tainted PhantomJS☆52Updated 10 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- Image size issues plugin for Burp Suite☆95Updated 7 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 8 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- Resources for developers and security engineers to learn the ropes of application security☆98Updated 7 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆169Updated 2 years ago
- ☆180Updated 12 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Updated 10 years ago
- Exploits and research stuffs☆55Updated last month
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35Updated 6 years ago
- ☆50Updated 8 years ago
- proxy poc implementation of STARTTLS stripping attacks☆171Updated 3 years ago
- The Internetwache CTF 2016 repository☆74Updated 4 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- Tool to help with the exploitation of web application race conditions☆184Updated 7 years ago
- DNS rebinding is powerful: how to steal WiFi passwords by just tricking a victim into visiting a website, thanks to that fancy Bang & Olu…☆81Updated 6 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago