Two hacking challenges related to HTTP request smuggling
☆19Mar 22, 2022Updated 4 years ago
Alternatives and similar repositories for http-request-smuggling-lab
Users that are interested in http-request-smuggling-lab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- uforall is a fast url crawler this tool crawl all URLs number of different sources, alienvault,WayBackMachine,urlscan,commoncrawl☆54Nov 3, 2025Updated 6 months ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 2 months ago
- ☆11Feb 9, 2023Updated 3 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ETHICAL-HACKING☆13Dec 20, 2023Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 10 months ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆16Jun 3, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Small container runtime for threat detection☆14Apr 13, 2025Updated last year
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆17Mar 13, 2026Updated last month
- Independant repo to my fork of exploitdb☆25Sep 22, 2020Updated 5 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- ☆25Jan 15, 2024Updated 2 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11Jun 24, 2021Updated 4 years ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CSV Manager for AWS Security Hub exports SecurityHub findings to a CSV file and allows you to mass-update SecurityHub findings by modifyi…☆17Jul 23, 2025Updated 9 months ago
- Short deep dive into Threat Hunting on AWS☆19Oct 15, 2023Updated 2 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- ☆19Apr 16, 2026Updated 3 weeks ago
- Easily create Splunk searches from Python and get the result as a Python object.☆14May 30, 2024Updated last year
- Configure and deploy AWS Security Hub.☆16Jul 28, 2023Updated 2 years ago
- Send high priority Deep Security events to the AWS Security Hub☆14Jul 31, 2019Updated 6 years ago
- Python tools for parsing Wikipedia/MediaWiki database dumps☆23Feb 28, 2013Updated 13 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆58Mar 25, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- ☆30Jul 5, 2023Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.☆14Apr 11, 2020Updated 6 years ago
- IP Sweeper Script is a script that will ping all the IP addresses in the given range and filter out the IPs that responded. This script i…☆18Nov 8, 2024Updated last year
- Instantly search the web for hacked data. Check if you appear in any database leaks.☆15Nov 22, 2018Updated 7 years ago