GoSecure / goinsecure-deserialization
Accompanying material needed for the workshop
☆11Updated last year
Alternatives and similar repositories for goinsecure-deserialization:
Users that are interested in goinsecure-deserialization are comparing it to the libraries listed below
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- HTTP requests of FrontPage expolit☆25Updated 11 years ago
- Updated 4 years ago
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- ☆26Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ☆34Updated last month
- Insecure Deserialization, PDF and lab☆17Updated 5 years ago
- Noob Penetration tester☆11Updated 9 months ago
- A Burp extension to show the Collaborator client in a tab☆23Updated 2 years ago
- ☆16Updated 2 years ago
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆17Updated 4 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆18Updated 4 years ago
- Extract subdomains from rapiddns.io☆23Updated 2 years ago
- Static analysis of APKs with regular expressions☆10Updated 3 years ago
- CVE, reports, research☆17Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆49Updated last year
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Take a list of URIs and print all the of the paths☆10Updated 4 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- Simple proxy which applies filters (default or custom) to your requests and responses, while you browse a website.☆8Updated 3 years ago
- ☆19Updated 4 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆12Updated 8 months ago