Acceis / vulnerable-code-snippets
Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.
☆22Updated last year
Alternatives and similar repositories for vulnerable-code-snippets:
Users that are interested in vulnerable-code-snippets are comparing it to the libraries listed below
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 2 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆47Updated 8 months ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆51Updated 4 years ago
- Dependency Confusion Security Testing Tool☆45Updated 2 years ago
- Most common AWS S3 bucket names.☆27Updated 4 years ago
- ☆25Updated 2 years ago
- ☆52Updated 2 years ago
- ☆29Updated 9 months ago
- Script for Bug Bounty☆28Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆25Updated last year
- Copy as XMLHttpRequest BurpSuite extension☆30Updated 3 years ago
- Ffuf output browser☆39Updated last year
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆35Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 2 years ago
- Collaborative vulnerability database for Pentesting & Pwndoc-Ng☆16Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆25Updated 5 months ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 2 years ago
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆18Updated 2 years ago
- AssetViz simplifies the visualization of subdomains from input files, presenting them as a coherent mind map. Ideal for penetration test…☆32Updated 10 months ago
- ☆48Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 5 months ago
- 🚀 Sling Shot R3con: Automate Your Bug Bounty and Pentest Reconnaissance with Project Discovery tools 🎯☆24Updated last year
- Web cache poisoning vulnerability scanner.☆64Updated 2 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆34Updated 9 months ago
- Make better use of the embedded browser that comes by default with Burp☆42Updated last year
- A collection of Burp Suite Lambda Filters ~ Bambdas☆25Updated 4 months ago
- ☆27Updated last year
- an Evil Java RMI Registry.☆48Updated 2 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆56Updated last year