Paradoxis / Flask-Unsign-WordlistLinks
The following package is the standalone wordlist-only component to flask-unsign.
☆43Updated last year
Alternatives and similar repositories for Flask-Unsign-Wordlist
Users that are interested in Flask-Unsign-Wordlist are comparing it to the libraries listed below
Sorting:
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Utility for creating ZipSlip archives☆79Updated 2 years ago
- ☆169Updated 4 years ago
- ☆64Updated 4 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆36Updated 3 years ago
- ☆28Updated 2 years ago
- a deterministic finite automata ranker☆72Updated 3 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆41Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- ☆41Updated 3 weeks ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆73Updated 2 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 10 months ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- ☆95Updated 4 years ago
- ☆51Updated 3 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆43Updated 4 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 3 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 4 years ago
- Repository to store exploits created by Assetnotes Security Research team☆179Updated 2 years ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Updated 7 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆62Updated 6 months ago
- A GraphQL enumeration and extraction tool☆133Updated 2 years ago
- Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10☆13Updated 2 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago