Companion labs to "An Exploration of JSON Interoperability Vulnerabilities"
☆210Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for json-interop-vuln-labs
Users that are interested in json-interop-vuln-labs are comparing it to the libraries listed below
Sorting:
- ☆95Sep 18, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆956Dec 31, 2021Updated 4 years ago
- Prototype Pollution and useful Script Gadgets☆1,589Jan 27, 2024Updated 2 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆346Nov 20, 2022Updated 3 years ago
- A vulnerable application exposing Spring Boot Actuators☆123Feb 25, 2019Updated 7 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆649Feb 21, 2024Updated 2 years ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- ☆1,200Sep 2, 2022Updated 3 years ago
- Find regular expressions which are vulnerable to ReDoS (Regular Expression Denial of Service)☆846Feb 9, 2024Updated 2 years ago
- Client Side Prototype Pollution Scanner☆522Sep 17, 2022Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- The cheat sheet about Java Deserialization vulnerabilities☆3,171May 26, 2023Updated 2 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,482Oct 12, 2024Updated last year
- ☆93Dec 4, 2025Updated 3 months ago
- Java RMI Vulnerability Scanner☆915Jul 3, 2024Updated last year
- ☆1,410Jan 22, 2026Updated last month
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Mar 2, 2022Updated 4 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Jan 29, 2021Updated 5 years ago
- ☆148Feb 17, 2022Updated 4 years ago
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- A cheatsheet for exploiting server-side SVG processors.☆793Jul 2, 2020Updated 5 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆657Feb 1, 2025Updated last year
- Fetch web pages using headless Chrome, storing all fetched resources including JavaScript files. Run arbitrary JavaScript on many web pag…☆529Apr 23, 2025Updated 10 months ago
- ☆36Jun 21, 2024Updated last year
- JMX enumeration and attacking tool.☆493Jun 26, 2025Updated 8 months ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆301May 22, 2023Updated 2 years ago
- ☆228Dec 18, 2025Updated 2 months ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago
- Content-Type Research☆656Jun 29, 2025Updated 8 months ago
- There is no pre-auth RCE in Jenkins since May 2017, but this is the one!☆607May 17, 2019Updated 6 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆447Sep 7, 2022Updated 3 years ago
- A tool to inspect and attack version 1 GUIDs☆239Oct 13, 2022Updated 3 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆483Dec 9, 2020Updated 5 years ago
- Finding Java gadget chains with CodeQL☆185Jan 14, 2025Updated last year
- ☆694Jul 4, 2022Updated 3 years ago
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆409Dec 24, 2022Updated 3 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,079Jun 15, 2021Updated 4 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆176Oct 26, 2024Updated last year