Paradoxis / Flask-Unsign-WordlistLinks
The following package is the standalone wordlist-only component to flask-unsign.
☆43Updated last year
Alternatives and similar repositories for Flask-Unsign-Wordlist
Users that are interested in Flask-Unsign-Wordlist are comparing it to the libraries listed below
Sorting:
- Utility for creating ZipSlip archives☆80Updated 2 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- ☆29Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36Updated 3 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆32Updated 4 years ago
- ☆65Updated 4 years ago
- Burp Extension that lets you use Burp Collaborator as a DNS server for exfiltrating data via Sqlmap☆36Updated 4 years ago
- ☆170Updated 4 years ago
- Gopher Tomcat Deployer☆48Updated 7 years ago
- ☆42Updated 2 months ago
- Burp Extension that copies a request and builds a FFUF skeleton☆112Updated 2 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 4 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- ☆43Updated 2 years ago
- ☆16Updated last month
- LFI to RCE via phpinfo() assistance or via controlled log file☆71Updated 2 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 3 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Updated 4 months ago
- ☆95Updated 4 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆64Updated 7 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated last year
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated last year
- ☆56Updated 4 years ago
- This repository contains all the examples related to a series of tutorials that demonstrate how to use the new Montoya API of Burp Suite …☆47Updated last month
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Updated 8 months ago