Example Cross Site Request Forgery (CSRF) vulnerabilities in action.
☆19Feb 20, 2017Updated 9 years ago
Alternatives and similar repositories for csrf-examples
Users that are interested in csrf-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SLSA level 3 action☆11Apr 26, 2024Updated last year
- Hackable website for teaching/training purposes. Includes my undergraduate thesis.☆14Mar 7, 2018Updated 8 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- Centralised event loop spinning☆20Aug 26, 2025Updated 7 months ago
- Code for Java and C++ youtube tutorials in channel: https://www.youtube.com/c/ZulkarnineMahmud.☆11Apr 18, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- https://hack.af/holidays☆16Jan 3, 2022Updated 4 years ago
- A Python tool to manage GitHub Organizations and perform backup☆21Jan 6, 2026Updated 2 months ago
- Extract the best title value from within HTML head elements.☆17Apr 17, 2023Updated 2 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 5 months ago
- Find Cve Exploits/POC from github☆17Jul 6, 2021Updated 4 years ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆36Jan 25, 2026Updated 2 months ago
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago
- ☆37Dec 13, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- WikiLeaks Vault 7 CIA Hacking Tools☆15Sep 9, 2017Updated 8 years ago
- Challenges of the final round of the Inter University CTF Competition by BUET CSE Fest 2023☆14Jul 23, 2023Updated 2 years ago
- A list of resources for those interested in getting started in bug bounties☆15Jan 15, 2019Updated 7 years ago
- A research project to crawl and analyze Top 1 million domains☆24Feb 7, 2023Updated 3 years ago
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 3 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- Paramix is a command-line tool for modifying the parameters of a list of URLs from stdin and returns them in stdout.☆17Aug 23, 2024Updated last year
- Toggle Burp proxy from anywhere and get its status in i3wm☆23Sep 2, 2024Updated last year
- All about subdomain enumeration☆16Feb 5, 2019Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Perform reverse DNS lookups on huge network ranges☆27Mar 9, 2026Updated 2 weeks ago
- ☆23Mar 29, 2022Updated 3 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- ☆40Aug 2, 2024Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆39Sep 25, 2024Updated last year
- This script will find some basic vulns. I made this script for my daily hunting. The best feature about this script is just run it in bac…☆20Feb 19, 2024Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- A definitely (read: not) secure online banking site. Built for demo purposes as an example of common security vulnerabilities / what NOT …☆25Feb 13, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 3 months ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 3 months ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Feb 15, 2020Updated 6 years ago
- Creates date-based wordlists that can be used for penetration testing, QA fixtures, or any workflow that needs exhaustive date coverage.☆16Oct 29, 2025Updated 4 months ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Mar 13, 2019Updated 7 years ago
- A chronological tracking of lies perpetrated against humanity.☆30Updated this week