Hakumarachi / WriteUpLinks
CTF challenges WriteUp
☆14Updated 3 years ago
Alternatives and similar repositories for WriteUp
Users that are interested in WriteUp are comparing it to the libraries listed below
Sorting:
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated 2 months ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Updated last year
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Updated 7 years ago
- Make better use of the embedded browser that comes by default with Burp☆44Updated 2 years ago
- ☆170Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Obtain GraphQL API schema despite disabled introspection!☆72Updated 4 years ago
- ☆29Updated 3 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated last year
- ☆21Updated 4 months ago
- BurpSuite extension to convert requests into bcheck scripts☆33Updated 2 years ago
- ☆95Updated 4 years ago
- Burp Extension that copies a request and builds a FFUF skeleton☆112Updated 2 years ago
- Security Advisories☆35Updated 3 months ago
- Bcheck scripts for Burp☆28Updated last year
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- ☆12Updated 3 years ago
- ☆59Updated last year
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated 2 years ago
- vīlicus is a bug bounty api dashboard☆42Updated 2 years ago
- Enhanced 403 bypass header☆21Updated 3 years ago
- For unpacking base64:ed "Save items"-content from Burp (From search + proxy history)☆54Updated 11 months ago
- ☆64Updated 2 years ago
- Flutter SSL pinning bypass using IP forwarding☆49Updated 3 years ago
- ☆58Updated last year
- ☆92Updated 2 months ago
- Information Security Information From Web☆28Updated 6 months ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆27Updated 7 months ago
- Query various sources for CVE proof-of-concepts☆53Updated 2 years ago
- ☆42Updated 2 months ago