Kirill89 / prototype-pollution-exploitsLinks
Prototype Pollution exploits collection
☆35Updated 3 years ago
Alternatives and similar repositories for prototype-pollution-exploits
Users that are interested in prototype-pollution-exploits are comparing it to the libraries listed below
Sorting:
- Client-Side Prototype Pollution Tools☆85Updated 3 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆31Updated 2 years ago
- ☆56Updated 3 years ago
- ☆94Updated 3 years ago
- ☆57Updated 6 months ago
- Extract SSL certificate data (Subject Name, Subject Alt Names, Organisation)☆43Updated 6 months ago
- Detects request smuggling via HTTP/2 downgrades.☆92Updated 3 years ago
- #BugBounty #BugBounty Tools #WebDeveloper Tool☆38Updated 2 months ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated last year
- Dependency Confusion Security Testing Tool☆48Updated 3 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Updated 7 years ago
- Additional nuclei templates☆38Updated last year
- ☆72Updated 3 years ago
- ☆74Updated last year
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- ☆24Updated 4 years ago
- A collection of scripts for bug-bounty related stuff☆39Updated 4 years ago
- ☆26Updated 2 years ago
- ☆21Updated 4 months ago
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Updated 3 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆28Updated 10 months ago
- a tool that compiles a csv of all h1 program stats☆47Updated 2 years ago
- ☆45Updated 4 years ago
- ☆33Updated 4 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago
- ☆166Updated 3 years ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago