NDevTK / CacheAttackLinks
No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed
☆12Updated 3 years ago
Alternatives and similar repositories for CacheAttack
Users that are interested in CacheAttack are comparing it to the libraries listed below
Sorting:
- Client-Side Prototype Pollution Tools☆85Updated 3 years ago
- DOM Clobbering Wiki, Browser Testing, and Payload Generation☆55Updated 4 months ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- Real world bug bounty wordlists☆117Updated 2 years ago
- Same Origin XSS challenge☆62Updated 3 years ago
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Updated 2 years ago
- PP-finder Help you find gadget for prototype pollution exploitation☆177Updated last year
- List of Trusted Types bypasses☆101Updated last year
- Awesome MXSS ??☆52Updated 11 months ago
- ☆56Updated 4 years ago
- Security Advisories☆34Updated last month
- PoC + Docker Environment for Python PIL/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509☆59Updated 4 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆31Updated 2 years ago
- Here i will post my writeups :)☆33Updated 2 years ago
- ☆72Updated 3 years ago
- Prototype Pollution Scanner☆126Updated 4 years ago
- ☆169Updated 3 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆132Updated 4 years ago
- Challenges I wrote for various CTF competitions☆44Updated last year
- This repository contains various XXE labs set up for different languages and their different parsers. This may alternatively serve as a p…☆111Updated last year
- Detects request smuggling via HTTP/2 downgrades.☆94Updated 3 years ago
- This repo contains solution for ctf challenges☆36Updated 9 months ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Blog about HTTP Request Smuggling, including a demo application.☆29Updated 3 years ago
- ☆94Updated 3 years ago
- ☆63Updated 2 years ago
- ☆76Updated 4 years ago
- A repository of wordlists for enumeration. Will be added to by my tools when they find interesting new entries☆23Updated 4 years ago
- WordPress Plugin Update Confusion☆66Updated 3 years ago