Lu3ky13 / Unauthorized-Access-to-Metadata-and-User-Data-like-CTFLinks
Unauthorized Access to Metadata and User Data like CTF
☆27Updated 7 months ago
Alternatives and similar repositories for Unauthorized-Access-to-Metadata-and-User-Data-like-CTF
Users that are interested in Unauthorized-Access-to-Metadata-and-User-Data-like-CTF are comparing it to the libraries listed below
Sorting:
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- Burp extension used to snip any header from all the requests.☆23Updated last year
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Updated 11 months ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆30Updated 7 months ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆17Updated last year
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆29Updated 10 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated 9 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆31Updated 11 months ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- Url scrapper or extractor from alienvault☆33Updated 4 months ago
- ☆18Updated last year
- ☆36Updated 7 months ago
- External recon toolkit☆50Updated 6 months ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- ☆10Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆38Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆45Updated 4 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit☆35Updated 5 months ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆66Updated last month
- ☆13Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- ☆11Updated 5 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- ☆43Updated 2 months ago
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Updated last year