RUB-NDS / DTD-AttacksView external linksLinks
Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java
☆55Jul 21, 2016Updated 9 years ago
Alternatives and similar repositories for DTD-Attacks
Users that are interested in DTD-Attacks are comparing it to the libraries listed below
Sorting:
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- DNS log http://zone.wooyun.org/content/27119☆21May 10, 2016Updated 9 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Apr 18, 2017Updated 8 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Creates a SOCK proxy server that transmits data over an SSRF vulnerability☆114Aug 8, 2012Updated 13 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆46Jan 25, 2016Updated 10 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Capture the flag - security challenges☆13Feb 29, 2016Updated 9 years ago
- ☆13Apr 11, 2018Updated 7 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆266Sep 9, 2021Updated 4 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆120Apr 26, 2021Updated 4 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆13Dec 17, 2018Updated 7 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- Burp extension that checks for interesting and security headers☆44Aug 12, 2020Updated 5 years ago
- fix time for java application using javaAgent☆24Dec 3, 2017Updated 8 years ago
- Keyboard Weak Password☆28Mar 29, 2016Updated 9 years ago
- ☆30Sep 1, 2022Updated 3 years ago
- OWASP Findings Format☆19Mar 4, 2021Updated 4 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- JavaPayload is a collection of pure Java payloads to be used for post-exploitation from pure Java exploits or from common misconfiguratio…☆125Jan 20, 2025Updated last year
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- CVE-2015-3152 PoC☆43May 11, 2015Updated 10 years ago
- 演示dubbo rpc Apache commons collections 的Java序列化漏洞☆42Nov 13, 2015Updated 10 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Dec 21, 2015Updated 10 years ago
- subdomain、port、folder scanner☆25Apr 20, 2016Updated 9 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- PoC implementation of the POODLE attack☆69May 13, 2015Updated 10 years ago
- 多线程网站目录穷举扫描修改版☆26Jun 17, 2016Updated 9 years ago
- some java code i met or i used☆29May 7, 2019Updated 6 years ago
- .NET Deserialization Passive Scanner☆46Mar 23, 2018Updated 7 years ago
- ☆23Apr 8, 2015Updated 10 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago