This is the data that powers the PortSwigger URL validation bypass cheat sheet.
☆59Feb 5, 2026Updated last month
Alternatives and similar repositories for url-cheatsheet-data
Users that are interested in url-cheatsheet-data are comparing it to the libraries listed below
Sorting:
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆16Jul 17, 2024Updated last year
- Quick overview of the domain.☆55Updated this week
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- Snippets of scripting randomness☆13Jun 9, 2022Updated 3 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection☆17Sep 16, 2024Updated last year
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Mar 18, 2020Updated 5 years ago
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆42Sep 23, 2025Updated 5 months ago
- A tool for adding new lines to files, skipping duplicates and written in Rust!☆19May 8, 2025Updated 10 months ago
- Proof of Concepts for unsafe deserialization in Ruby☆17Oct 17, 2024Updated last year
- Burp extension to fuzz/brute force GenAI/LLM prompts using a list of various payloads.☆29Sep 4, 2025Updated 6 months ago
- General scripts that gather information out of Active Directory☆16Jun 9, 2022Updated 3 years ago
- ☆38Dec 14, 2024Updated last year
- ☆18Feb 14, 2019Updated 7 years ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆122Jan 30, 2026Updated last month
- is a tool to automate and organize reconnaissance operations.☆25Sep 6, 2023Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆89Jul 5, 2022Updated 3 years ago
- This repository is a collection of JavaScript gadgets that can be used to bypass XSS mitigations such as Content Security Policy (CSP) an…☆132Feb 4, 2026Updated last month
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆23Aug 7, 2024Updated last year
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- ☆20Jun 16, 2019Updated 6 years ago
- Analyze an APK archive.☆28Feb 24, 2024Updated 2 years ago
- A Burp Suite extension for analyzing Next.js Server Actions - server-side functions identified by hash IDs and `Next-Action` headers.☆47Aug 8, 2025Updated 7 months ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- AWS,AZURE,GOOGLE CLOUD IP CIDRS☆50Feb 14, 2022Updated 4 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- A collection of pyjails!☆28Dec 15, 2025Updated 2 months ago
- Differential testing framework for HTTP implementations☆926Jan 21, 2026Updated last month
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆29Aug 29, 2021Updated 4 years ago
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 2 years ago
- Content-Type Research☆656Jun 29, 2025Updated 8 months ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year