JLLeitschuh / lgtm_hack_scripts
Collection of python helper API's for interacting with LGTM.com in ways the official API doesn't support.
☆23Updated 2 years ago
Alternatives and similar repositories for lgtm_hack_scripts:
Users that are interested in lgtm_hack_scripts are comparing it to the libraries listed below
- ☆34Updated 2 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Updated last year
- Compiled dataset of Java deserialization CVEs☆61Updated 4 years ago
- ☆28Updated 4 years ago
- ☆59Updated 2 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Updated 3 years ago
- Full TTY reverse shell over SSH☆58Updated 4 years ago
- CircleCI log and security configuration automations☆22Updated 4 years ago
- ☆34Updated 5 years ago
- A collection of utilities to simplify the creation of Burp Suite plugins☆22Updated last year
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆9Updated 4 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year
- Proof of Concepts for unsafe deserialization in Ruby☆17Updated 4 months ago
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- Chrome extension to detect possible xsleaks☆12Updated 5 years ago
- Jekyll Files for cloudsecwiki.com☆51Updated 3 years ago
- ☆36Updated 4 years ago
- Manual JavaScript Linting is a Bug☆49Updated 3 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆62Updated 4 years ago
- ☆15Updated 3 years ago
- Extract relative urls from a heap snapshot☆85Updated 3 years ago
- BURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.☆63Updated 2 weeks ago
- Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data☆26Updated 3 years ago
- A collection of my Semgrep rules☆48Updated last year
- ☆44Updated 4 years ago
- Some of my public exploits☆51Updated 4 years ago
- CTF writeups☆30Updated 2 years ago
- #BugBounty #BugBounty Tools #WebDeveloper Tool☆37Updated 5 years ago
- Client-Side Prototype Pollution Tools☆84Updated 3 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆37Updated 2 months ago