An SSRF-preventing wrapper around Python's requests library. Advocate is no longer maintained, please fork and rename if you would like to continue work on it.
☆95Aug 31, 2023Updated 2 years ago
Alternatives and similar repositories for Advocate
Users that are interested in Advocate are comparing it to the libraries listed below
Sorting:
- SSRF Protection Library for PHP - http://safecurl.fin1te.net☆73Aug 30, 2023Updated 2 years ago
- cve-2014-0130 rails directory traversal vuln☆19May 15, 2017Updated 8 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- ☆29Jan 15, 2017Updated 9 years ago
- Tool for CVE-2018-16323☆82Jan 17, 2019Updated 7 years ago
- A list of OpenStack Security Best Practices - written in Markdown☆10Apr 8, 2015Updated 10 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- CVE-2017-9506 - SSRF☆190Feb 14, 2022Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- ☆21Oct 17, 2023Updated 2 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- S2-046-PoC☆112Mar 21, 2017Updated 8 years ago
- Probe a rendering engine for vulnerabilities and other features☆367Oct 13, 2021Updated 4 years ago
- 优质安全 list☆12Nov 22, 2017Updated 8 years ago
- Burp Extension for AWS Signing☆92Jan 10, 2025Updated last year
- exploit for ImageMagick's uninitialized memory disclosure in gif coder☆284Jul 22, 2017Updated 8 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Vulnerabilities advisories and PoC☆18Nov 21, 2025Updated 3 months ago
- Wordlist to get files/ folders listed by the app that may expose passwords, sensitive file or folders☆22Jul 10, 2020Updated 5 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆265Nov 18, 2021Updated 4 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated 2 months ago
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆93Aug 27, 2019Updated 6 years ago
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- My configs, tools and what not. For everytime that I blow up my vm....☆18Jan 21, 2020Updated 6 years ago
- Static analysis tool for Rails apps☆21Mar 9, 2015Updated 11 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Nov 6, 2017Updated 8 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- Wordlists for intelligent directory brute-forcing☆33Sep 28, 2021Updated 4 years ago
- Scans tcl for command injection☆36May 24, 2019Updated 6 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- Collection of CTF challenges I made☆53Jan 3, 2025Updated last year
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- The action integrates Electronegativity, a tool to identify misconfigurations and security anti-patterns in Electron applications, into G…☆15Apr 15, 2023Updated 2 years ago
- 一个简易的ssh密码防暴力破解程序☆27Feb 21, 2017Updated 9 years ago
- Simple Server Side Request Forgery services enumeration tool.☆56Aug 23, 2018Updated 7 years ago
- ☆11Dec 5, 2020Updated 5 years ago