Paradoxis / Flask-Unsign-WordlistLinks
The following package is the standalone wordlist-only component to flask-unsign.
☆40Updated last year
Alternatives and similar repositories for Flask-Unsign-Wordlist
Users that are interested in Flask-Unsign-Wordlist are comparing it to the libraries listed below
Sorting:
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Utility for creating ZipSlip archives☆77Updated 2 years ago
- ☆27Updated 2 years ago
- ☆169Updated 3 years ago
- ☆64Updated 3 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆71Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 3 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- a deterministic finite automata ranker☆71Updated 3 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Updated 4 months ago
- ☆84Updated 2 months ago
- ☆40Updated 3 months ago
- A Burp Suite extension which augments your proxy traffic by injecting log4shell payloads into headers☆42Updated 3 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆98Updated 3 weeks ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆29Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Updated 8 months ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- Burp Extension that copies a request and builds a FFUF skeleton☆111Updated last year
- InfluxDB CVE-2019-20933 vulnerability exploit☆41Updated 3 years ago
- ☆95Updated 4 years ago
- Workshop given at Hack in Paris 2019☆124Updated 2 years ago
- an Evil Java RMI Registry.☆52Updated 2 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆113Updated 3 years ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- ☆14Updated 3 months ago
- Improve automated and semi-automated active scanning in Burp Pro☆62Updated 3 months ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago