XXE techniques
☆14Oct 10, 2021Updated 4 years ago
Alternatives and similar repositories for XXE-Notes
Users that are interested in XXE-Notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Sep 1, 2024Updated last year
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- A tool to show only printable characters of a file☆11Oct 2, 2023Updated 2 years ago
- This repository houses diverse files and challenges centered around Just Mobile Security. With practical exercises and resources aimed at…☆13Apr 15, 2024Updated last year
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Alpine Linux based phpBB3 docker image☆15Jun 17, 2024Updated last year
- ☆48Jul 30, 2025Updated 7 months ago
- A cross-platform tool to work with Security Identifiers (SID) formats.☆15Jun 21, 2025Updated 9 months ago
- Active Directory Enumeration and Exploitation☆13Feb 3, 2026Updated last month
- ☆13Jun 27, 2023Updated 2 years ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Sep 8, 2021Updated 4 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Jul 19, 2024Updated last year
- Advisories and Proofs of Concept by BlackArrow☆19Dec 17, 2024Updated last year
- MySQL Injection Exfoliation Optimization☆24Sep 15, 2019Updated 6 years ago
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆147Apr 21, 2025Updated 11 months ago
- Malware to gain persistence on a victims machine.☆20Feb 12, 2023Updated 3 years ago
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆16Jan 22, 2025Updated last year
- A python library to interact with Pwndoc instances for pentest reports generation☆24May 19, 2025Updated 10 months ago
- A tool to generate wordlists based on case☆30Nov 24, 2025Updated 4 months ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- JavaScript source map parser and extractor written in Python☆24Aug 6, 2019Updated 6 years ago
- ☆20May 1, 2024Updated last year
- Apache-Flink-Web-Dashboard-RCE☆16Nov 15, 2019Updated 6 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- Burp plugin for jxscout☆20May 12, 2025Updated 10 months ago
- PP-finder Help you find gadget for prototype pollution exploitation☆189Aug 8, 2024Updated last year
- API for Asset Service☆15Aug 15, 2024Updated last year
- 📦 A GitHub Action that performs a security scan of your GitHub Actions.☆26Oct 28, 2024Updated last year
- Dynamically deploy containers for CTF challenges.☆22Nov 29, 2025Updated 3 months ago
- ☆11Oct 30, 2024Updated last year
- WEB API fuzzing☆23Apr 30, 2025Updated 10 months ago
- A list of weird comparison in SQL☆15May 20, 2022Updated 3 years ago
- Extensible MacOS system telemetry generator.☆55Mar 1, 2026Updated 3 weeks ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- Unofficial micro-architecture optimized hardened_malloc package☆13Mar 2, 2026Updated 3 weeks ago
- Wingkalabs (Linux) Wingkalabs es una máquina Virtual Linux intencionalmente vulnerable. Esta máquina virtual se puede utilizar para real…☆22Mar 14, 2018Updated 8 years ago
- Performs active information gathering about Joomla sites☆17Jul 13, 2017Updated 8 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago