BlackFan / content-type-research
Content-Type Research
☆612Updated last year
Alternatives and similar repositories for content-type-research:
Users that are interested in content-type-research are comparing it to the libraries listed below
- Client Side Prototype Pollution Scanner☆518Updated 2 years ago
- ☆674Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆861Updated 3 years ago
- ☆537Updated 3 weeks ago
- List DTDs and generate XXE payloads using those local DTDs.☆624Updated last year
- a javascript change monitoring tool for bugbounties☆638Updated 8 months ago
- Unofficial documentation for the great tool Param Miner☆179Updated 2 years ago
- A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀☆614Updated 2 years ago
- A Firefox Web Extension to improve the discovery of DOM XSS.☆272Updated 5 months ago
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆355Updated 8 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆623Updated 5 months ago
- Automated learning of regexes for DNS discovery☆364Updated 2 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆237Updated 3 years ago
- Fetches javascript file from a list of URLS or subdomains.☆763Updated last year
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆376Updated 3 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆497Updated last month
- A tool to embed XXE and XSS payloads in docx, odt, pptx, xlsx files (oxml_xxe on steroids)☆599Updated last year
- Deriving RSA public keys from message-signature pairs☆310Updated 11 months ago
- IIS shortname scanner written in Go☆328Updated 2 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆473Updated 2 years ago
- A fuzzer for detecting open redirect vulnerabilities☆745Updated 9 months ago
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆356Updated 4 years ago
- Accept URLs on stdin, replace all query string values with a user-supplied value☆808Updated 2 years ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆503Updated 2 years ago
- Burpsuite plugin for Interact.sh☆218Updated 9 months ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆310Updated 5 months ago
- A cheatsheet for exploiting server-side SVG processors.☆728Updated 4 years ago
- HackerOne "in scope" domains☆439Updated this week
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆631Updated last year
- A tool to check a bunch of URLs that contain reflecting params.☆568Updated 8 months ago