Paradoxis / Flask-Unsign-WordlistLinks
The following package is the standalone wordlist-only component to flask-unsign.
☆42Updated last year
Alternatives and similar repositories for Flask-Unsign-Wordlist
Users that are interested in Flask-Unsign-Wordlist are comparing it to the libraries listed below
Sorting:
- Utility for creating ZipSlip archives☆79Updated 2 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆99Updated 2 months ago
- ☆27Updated 2 years ago
- ☆64Updated 3 years ago
- ☆169Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆59Updated 2 years ago
- ☆41Updated last week
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆29Updated last year
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- ☆106Updated 2 years ago
- ☆14Updated 5 months ago
- an Evil Java RMI Registry.☆51Updated 2 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- a deterministic finite automata ranker☆71Updated 3 years ago
- NotSoCereal: A Deserialization exploit playground☆53Updated 3 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆42Updated 4 years ago
- ☆95Updated 4 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆41Updated 3 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆67Updated 6 months ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 2 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 9 months ago
- ☆51Updated 3 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 4 years ago