PwnFunction / Next.js-Flat-Prototype-PollutionLinks
Prototype Pollution using `flat` with Next.js
☆106Updated 2 months ago
Alternatives and similar repositories for Next.js-Flat-Prototype-Pollution
Users that are interested in Next.js-Flat-Prototype-Pollution are comparing it to the libraries listed below
Sorting:
- a CTF web challenge about making screenshots☆224Updated 4 years ago
- Example of a vulnerable NodeJS+Express+MySQL service☆20Updated 2 years ago
- Small example repo for looking into log4j CVE-2021-44228☆71Updated 3 years ago
- Public Roadmap | huntr.dev☆267Updated last year
- No longer maintained. Timing attacks on a browsers cache to try to predict websites/subreddits that have been viewed☆12Updated 3 years ago
- A Firefox Web Extension to improve the discovery of DOM XSS.☆279Updated 11 months ago
- Track HackerOne reports and leaderboard changes on programs through a Discord webhook☆33Updated 9 months ago
- Client-Side Prototype Pollution Tools☆85Updated 4 years ago
- Mario the game but you rescue the princess by hacking.☆22Updated 3 years ago
- Prototype Pollution in JavaScript☆75Updated 3 years ago
- List of Trusted Types bypasses☆102Updated last year
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆299Updated 2 years ago
- a Go code to detect leaks in JS files via regex patterns☆149Updated 4 years ago
- A tool for exploring Firebase datastores.☆231Updated 3 months ago
- Go scripts for finding sensitive data like API key / some keywords in the github repository☆159Updated 3 years ago
- 🎩 🤟🏻 [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variables…☆340Updated 3 years ago
- A list of governments with Vulnerability Disclosure Policies☆95Updated last year
- ☆83Updated this week
- An extension for checking if .git is exposed in visited websites☆443Updated 2 months ago
- A list of universities with vulnerability disclosure policies☆51Updated 4 years ago
- Tool to find the real IP behind CDNs/WAFs like cloudflare using passive recon by retrieving the favicon hash. For the same hash value, al…☆183Updated 4 years ago
- DOM XSS Game☆89Updated 3 years ago
- Content-Security-Policy (CSP) Bypass Techniques☆70Updated 5 years ago
- 🌯 Give me a web shell, I'll give you a terminal.☆195Updated 3 years ago
- list of regex patterns for oauth / api tokens with provided source☆278Updated 9 months ago
- A tool inspired by sqlmap specifically for MongoDB Injection☆31Updated 5 years ago
- Insecure Firebase | Bugbounty | Hacking Insecure Firbase☆92Updated 4 years ago
- ☆130Updated 4 years ago
- grapX will iterate through the URLs and grep the endpoints with all possible extensions.☆56Updated 4 years ago
- PoC + Docker Environment for Python PIL/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509☆58Updated 4 years ago