NotSoSecure / NotSoCereal-LabLinks
NotSoCereal: A Deserialization exploit playground
☆54Updated 4 years ago
Alternatives and similar repositories for NotSoCereal-Lab
Users that are interested in NotSoCereal-Lab are comparing it to the libraries listed below
Sorting:
- ☆42Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Wordlist to bruteforce for LFI☆128Updated 6 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Updated 4 months ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆119Updated 2 years ago
- Workshop given at Hack in Paris 2019☆125Updated 2 years ago
- ☆58Updated last year
- ☆29Updated 3 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆37Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Information Security Information From Web☆28Updated 5 months ago
- Improve automated and semi-automated active scanning in Burp Pro☆63Updated 7 months ago
- Burp Extension that copies a request and builds a FFUF skeleton☆112Updated 2 years ago
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆119Updated 2 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆87Updated 2 weeks ago
- A simple tool to detect vulnerabilities described here https://portswigger.net/research/browser-powered-desync-attacks.☆36Updated 3 years ago
- An MS Sharepoint and Frontpage Auditing Tool☆57Updated last year
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆80Updated 2 years ago
- BurpSuite using the document and some extensions☆72Updated 5 years ago
- A list of threat sinks used in the manual security source code review for application security☆74Updated 2 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- A list of "secrets" from JWT sample code and readme files.☆57Updated 5 years ago
- ☆93Updated last month
- ☆170Updated 4 years ago
- ☆43Updated 2 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 11 months ago
- ☆44Updated 4 years ago
- HTTP parameter discovery suite.☆63Updated 5 years ago