☆29Jan 10, 2023Updated 3 years ago
Alternatives and similar repositories for request-smuggling-workshop
Users that are interested in request-smuggling-workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blog about HTTP Request Smuggling, including a demo application.☆32Jan 4, 2022Updated 4 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Mar 22, 2022Updated 4 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- ☆15May 17, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Chrome extension to detect possible xsleaks☆12May 4, 2019Updated 6 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- Python tool for expired domain discovery in crossdomain.xml files☆23Feb 21, 2017Updated 9 years ago
- ☆93Apr 29, 2024Updated last year
- Unofficial documentation for the great tool Param Miner☆185Aug 21, 2022Updated 3 years ago
- ☆42Dec 1, 2023Updated 2 years ago
- TokyoWesterns CTF 4th 2018 shrine☆12Aug 23, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆22Nov 3, 2022Updated 3 years ago
- Simple XXE test suite generated specifically for SAML interfaces☆23May 18, 2018Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Jira Information Gatherer☆29Dec 3, 2017Updated 8 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Nov 8, 2025Updated 5 months ago
- Jekyll theme for documentation 📝 built with material web components☆10Apr 3, 2026Updated last week
- Security challenges and CTFs created by the Penultimate team.☆14Feb 22, 2018Updated 8 years ago
- A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻☆125Sep 6, 2022Updated 3 years ago
- Basic Bash Script to scrape all subdomains from crtsh in a single run☆19May 23, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Dec 5, 2022Updated 3 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- ☆26Mar 11, 2025Updated last year
- Workshop given at Hack in Paris 2019☆126Jun 8, 2023Updated 2 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 5 years ago
- a javascript change monitoring tool for bugbounties☆722Jul 31, 2024Updated last year
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆127Jan 10, 2023Updated 3 years ago
- A comprehensive database of Model Context Protocol vulnerabilities, security research, and exploits☆36Feb 16, 2026Updated last month
- Awesome information for WebSockets security research☆303Jan 10, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆348Nov 20, 2022Updated 3 years ago
- ☆12Oct 10, 2024Updated last year
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 7 months ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- Prototype Pollution Lab☆18Nov 20, 2020Updated 5 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 5 months ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago