Prototype Pollution in JavaScript
☆75Aug 30, 2022Updated 3 years ago
Alternatives and similar repositories for prototype-pollution-explained
Users that are interested in prototype-pollution-explained are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 7 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- ☆15Apr 13, 2021Updated 5 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆13Dec 13, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- Hands-on practical use of HTTP security headers as browser security controls to help secure web applications☆20Jan 14, 2023Updated 3 years ago
- Client Side Prototype Pollution Scanner☆524Sep 17, 2022Updated 3 years ago
- Node in the middle. Intercept calls to the node binary and set some node specific flags before running a program☆26Aug 10, 2018Updated 7 years ago
- Learn what is NoSQL injection and how to find them ?☆10Jul 22, 2021Updated 4 years ago
- Programmatically fetch security vulnerabilities with one or many strategies (GitHub Advisory, Sonatype, OSV, Snyk).☆32Apr 13, 2026Updated 2 weeks ago
- tetctf2020_amf_writeups☆23Jan 3, 2021Updated 5 years ago
- ☆21Dec 15, 2020Updated 5 years ago
- A Burp Suite extension for headless, unattended scanning.☆37Jun 24, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Prototype Pollution - A detailed study + hands on lab.☆16Oct 11, 2022Updated 3 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆18Mar 22, 2023Updated 3 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Dec 29, 2021Updated 4 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆32Nov 4, 2022Updated 3 years ago
- ☆54Jan 22, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- ☆38Nov 27, 2020Updated 5 years ago
- Prototype Pollution and useful Script Gadgets☆1,612Jan 27, 2024Updated 2 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Blind spot is a python tool for blind injection vulnerabilities , SQLi time based , Command injection , code injection , SSTI☆27Jan 6, 2021Updated 5 years ago
- ☆13Jul 12, 2021Updated 4 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 6 years ago
- Realtime V8 Tick Profiler☆13Sep 27, 2020Updated 5 years ago
- Policy management tool for Node.js☆22Dec 2, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Fuzz testing framework☆33Feb 4, 2019Updated 7 years ago
- Proof of concept code for client-side vulnerabilities☆17Mar 14, 2019Updated 7 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆519Jun 22, 2022Updated 3 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- ☆60Jan 9, 2023Updated 3 years ago
- POC which exploits a vulnerability within Nagios XI (5.6.5) to spawn a root shell☆14Jul 17, 2021Updated 4 years ago