NDevTK / CacheAttack
No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed
☆11Updated 3 years ago
Alternatives and similar repositories for CacheAttack:
Users that are interested in CacheAttack are comparing it to the libraries listed below
- DOM Clobbering Wiki, Browser Testing, and Payload Generation☆48Updated 4 months ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- Client-Side Prototype Pollution Tools☆84Updated 3 years ago
- Searcher for cross-site leaks (XS-Leaks)☆81Updated 2 years ago
- Same Origin XSS challenge☆56Updated 2 years ago
- A cheatsheet for exploiting server-side SVG rasterization.☆30Updated 2 years ago
- ☆94Updated 3 years ago
- ☆56Updated 3 years ago
- Security Advisories☆32Updated last year
- ☆70Updated 3 years ago
- Dependency Confusion Security Testing Tool☆47Updated 2 years ago
- HTTP request smuggling tools☆18Updated 4 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆31Updated 2 years ago
- Pass list of urls with FUZZ in and it will check if it has found a potential SSRF.☆107Updated 3 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆87Updated 2 years ago
- WordPress Plugin Update Confusion☆66Updated 3 years ago
- Extract relative urls from a heap snapshot☆86Updated 3 years ago
- This repository is an interactive collection of my solutions to various XSS challenges.☆12Updated 4 years ago
- Additional nuclei templates☆37Updated last year
- ☆23Updated 3 years ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Updated 5 months ago
- Prototype Pollution exploits collection☆32Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆70Updated 3 years ago
- A simple tool to detect vulnerabilities described here https://portswigger.net/research/browser-powered-desync-attacks.☆36Updated 2 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆27Updated 6 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆64Updated last year
- ☆57Updated 2 months ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Updated 2 years ago
- Here i will post my writeups :)☆31Updated 2 years ago