GoSecure / goinsecure-deserialization
Accompanying material needed for the workshop
☆11Updated last year
Alternatives and similar repositories for goinsecure-deserialization:
Users that are interested in goinsecure-deserialization are comparing it to the libraries listed below
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆18Updated 4 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- HTTP requests of FrontPage expolit☆25Updated 11 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- CVE, reports, research☆17Updated 4 years ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- Noob Penetration tester☆11Updated 10 months ago
- ☆35Updated 2 months ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 4 years ago
- ☆16Updated 2 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- ☆19Updated 4 years ago
- ☆26Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ☆18Updated 3 years ago
- Static analysis of APKs with regular expressions☆10Updated 3 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated 10 months ago
- Magento Security Scanner☆15Updated 3 years ago
- ☆22Updated 3 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Updated 4 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- Updated 4 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Updated 4 years ago
- Simple proxy which applies filters (default or custom) to your requests and responses, while you browse a website.☆8Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago