List DTDs and generate XXE payloads using those local DTDs.
☆655Feb 21, 2024Updated 2 years ago
Alternatives and similar repositories for dtd-finder
Users that are interested in dtd-finder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆614Mar 4, 2021Updated 5 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆448Sep 7, 2022Updated 3 years ago
- ☆705Nov 27, 2024Updated last year
- ☆563Mar 27, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automatic tool for DNS rebinding-based SSRF attacks☆305Aug 21, 2020Updated 5 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,489Oct 12, 2024Updated last year
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- A tool to embed XXE and XSS payloads in docx, odt, pptx, xlsx files (oxml_xxe on steroids)☆682Jan 28, 2024Updated 2 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,069Jan 2, 2024Updated 2 years ago
- Prototype Pollution and useful Script Gadgets☆1,612Jan 27, 2024Updated 2 years ago
- ☆697Jul 4, 2022Updated 3 years ago
- Client Side Prototype Pollution Scanner☆524Sep 17, 2022Updated 3 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆967Dec 31, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,346Apr 18, 2023Updated 3 years ago
- A mini webserver with FTP support for XXE payloads☆341Jan 3, 2024Updated 2 years ago
- A tool for embedding XXE/XML exploits into different filetypes☆1,154Dec 16, 2024Updated last year
- An hourly updated list of subdomains gathered from certificate transparency logs☆346Oct 13, 2021Updated 4 years ago
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,770Apr 22, 2026Updated last week
- Apache Solr Injection Research☆581Jan 28, 2020Updated 6 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆278Jan 28, 2025Updated last year
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,799Apr 26, 2024Updated 2 years ago
- Java RMI Vulnerability Scanner☆919Jul 3, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆347Nov 20, 2022Updated 3 years ago
- A cheatsheet for exploiting server-side SVG processors.☆798Jul 2, 2020Updated 5 years ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,654Sep 3, 2023Updated 2 years ago
- Reverse proxies cheatsheet☆1,862Nov 4, 2023Updated 2 years ago
- Content-Type Research☆662Jun 29, 2025Updated 10 months ago
- jsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints.☆154Feb 15, 2021Updated 5 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,182Aug 14, 2024Updated last year
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆301Feb 12, 2023Updated 3 years ago
- Notes about attacking Jenkins servers☆2,092Jul 10, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple SSRF-testing sheriff written in Go☆337Oct 31, 2024Updated last year
- A python script that finds endpoints in JavaScript files☆4,334Apr 13, 2024Updated 2 years ago
- A byte code analyzer for finding deserialization gadget chains in Java applications☆1,081Jun 15, 2021Updated 4 years ago
- TheftFuzzer is a tool that fuzzes Cross-Origin Resource Sharing implementations for common misconfigurations.☆319May 22, 2023Updated 2 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,907Mar 20, 2026Updated last month
- DNSGen is a powerful and flexible DNS name permutation tool designed for security researchers and penetration testers. It generates intel…☆1,064Jan 3, 2025Updated last year
- ☆1,202Sep 2, 2022Updated 3 years ago