BishopFox / json-interop-vuln-labsView external linksLinks
Companion labs to "An Exploration of JSON Interoperability Vulnerabilities"
☆212Mar 9, 2023Updated 2 years ago
Alternatives and similar repositories for json-interop-vuln-labs
Users that are interested in json-interop-vuln-labs are comparing it to the libraries listed below
Sorting:
- ☆95Sep 18, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆946Dec 31, 2021Updated 4 years ago
- Prototype Pollution and useful Script Gadgets☆1,581Jan 27, 2024Updated 2 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆613Mar 4, 2021Updated 4 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆346Nov 20, 2022Updated 3 years ago
- A vulnerable application exposing Spring Boot Actuators☆123Feb 25, 2019Updated 6 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆645Feb 21, 2024Updated last year
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- ☆1,201Sep 2, 2022Updated 3 years ago
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆846Feb 9, 2024Updated 2 years ago
- Client Side Prototype Pollution Scanner☆524Sep 17, 2022Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Jan 30, 2025Updated last year
- The cheat sheet about Java Deserialization vulnerabilities☆3,167May 26, 2023Updated 2 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,484Oct 12, 2024Updated last year
- ☆92Dec 4, 2025Updated 2 months ago
- Java RMI Vulnerability Scanner☆914Jul 3, 2024Updated last year
- ☆1,405Jan 22, 2026Updated 3 weeks ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Mar 2, 2022Updated 3 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Jan 29, 2021Updated 5 years ago
- ☆148Feb 17, 2022Updated 3 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- A cheatsheet for exploiting server-side SVG processors.☆790Jul 2, 2020Updated 5 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆661Feb 1, 2025Updated last year
- Fetch web pages using headless Chrome, storing all fetched resources including JavaScript files. Run arbitrary JavaScript on many web pag…☆528Apr 23, 2025Updated 9 months ago
- ☆35Jun 21, 2024Updated last year
- JMX enumeration and attacking tool.☆494Jun 26, 2025Updated 7 months ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆301May 22, 2023Updated 2 years ago
- ☆226Dec 18, 2025Updated last month
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- Content-Type Research☆657Jun 29, 2025Updated 7 months ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆607May 17, 2019Updated 6 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆445Sep 7, 2022Updated 3 years ago
- A tool to inspect and attack version 1 GUIDs☆239Oct 13, 2022Updated 3 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆484Dec 9, 2020Updated 5 years ago
- Finding Java gadget chains with CodeQL☆184Jan 14, 2025Updated last year
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆404Dec 24, 2022Updated 3 years ago
- ☆695Jul 4, 2022Updated 3 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆175Oct 26, 2024Updated last year
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,080Jun 15, 2021Updated 4 years ago