The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.
☆111Jul 22, 2025Updated 8 months ago
Alternatives and similar repositories for template-injection-table
Users that are interested in template-injection-table are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Template Injection Playground allows to test a large number of the most relevant template engines for template injection possibilitie…☆65Jan 3, 2026Updated 3 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆410Dec 22, 2025Updated 3 months ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Oct 14, 2024Updated last year
- GitHubApi CVE Poc监控工具☆14Jan 23, 2026Updated 2 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆31Feb 13, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- A PoC executing shellcode in Dart☆14Jun 28, 2022Updated 3 years ago
- clfs CVE 的一些 POC 收集☆16Oct 27, 2022Updated 3 years ago
- Recon scripts for Red Team and Web blackbox auditing☆25Mar 3, 2026Updated last month
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆36Feb 9, 2024Updated 2 years ago
- Remotely dump NT hashes through Windows Crash dumps☆33Oct 29, 2024Updated last year
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆162Jul 2, 2024Updated last year
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated last month
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Extract GraphQL operations from javascript☆23Mar 18, 2026Updated 3 weeks ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated 2 years ago
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆32Mar 27, 2026Updated 2 weeks ago
- ☆11Mar 18, 2026Updated 3 weeks ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆435Mar 28, 2026Updated last week
- wo ee cve-2022-2185 gitlab authenticated rce☆80Jul 29, 2022Updated 3 years ago
- A multi coroutine concurrent batch URL survival detection tool written in Go, with concurrency determined by CPU by default.一个go编写的多协程并发批…☆12Jan 9, 2024Updated 2 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- 一个简单的指纹识别小工具☆21Oct 23, 2023Updated 2 years ago
- JSBerg is a fast and efficient URL scraper that extracts links, JavaScript files, CSS files, images, and inline URLs from a list of websi…☆23Mar 19, 2025Updated last year
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Apr 27, 2023Updated 2 years ago
- This program detects if any security software (AV, EDR, XDR, firewall, etc.) is running on the system. The program searches the list of r…☆50Mar 16, 2026Updated 3 weeks ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- A collection of js analysis tools & scripts.☆19Mar 8, 2026Updated last month
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆239Oct 8, 2024Updated last year
- BurpSuite dockerized☆11Mar 2, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Gotta go fast☆155Dec 5, 2025Updated 4 months ago
- Automate converting webshells into reverse shells.☆72Mar 16, 2026Updated 3 weeks ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- ☆43Mar 13, 2023Updated 3 years ago
- Research into WinSxS binaries and finding hijackable paths☆30Dec 7, 2025Updated 4 months ago