Authenticated SSRF in Grafana
☆83Jun 24, 2024Updated last year
Alternatives and similar repositories for grafana-ssrf
Users that are interested in grafana-ssrf are comparing it to the libraries listed below
Sorting:
- Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin☆45Mar 13, 2023Updated 2 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆279Feb 11, 2021Updated 5 years ago
- This is a burp plugin that extracts keywords from response using regexes and test for reflected XSS on the target scope.☆74Nov 5, 2020Updated 5 years ago
- NodeJS script to extract assets for the Apple bug bounty program from their security acknowledgments page for bug bounty recon.☆78Nov 5, 2022Updated 3 years ago
- Subvenkon is a subdomain enumerator from Venkon☆22Jun 22, 2020Updated 5 years ago
- differer finds how URLs are parsed by different languages in order to help bug hunters break filters☆63May 3, 2020Updated 5 years ago
- Tool for catching and logging different types of requests.☆220Nov 20, 2020Updated 5 years ago
- A better version of my xssfinder tool - scans for different types of xss on a list of urls.☆187Aug 3, 2019Updated 6 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆78Dec 29, 2019Updated 6 years ago
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Feb 2, 2023Updated 3 years ago
- A tool for append URLs, skipping duplicates/paths & combine parameters.☆128Mar 2, 2022Updated 4 years ago
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆40May 21, 2021Updated 4 years ago
- ☆15Dec 15, 2020Updated 5 years ago
- a tool that compiles a csv of all h1 program stats☆49Jul 2, 2023Updated 2 years ago
- Apache/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Diffe…☆53Jun 6, 2021Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆39Jan 20, 2023Updated 3 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- A simple tool to detect wildcards domain based on Amass's wildcards detector.☆65Apr 13, 2021Updated 4 years ago
- This Repo contains wordlist for subdomain enumeration , php file path, html file path, and js file path☆107Aug 4, 2020Updated 5 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- You can read the writeup on this script here☆274Jul 12, 2020Updated 5 years ago
- List HackerOne private program assets☆154Jun 24, 2021Updated 4 years ago
- A tool to exploit imagetragick vulnerability to gain remote code execution☆20Dec 20, 2017Updated 8 years ago
- Burp Suite extension for JAX-RS☆65Mar 17, 2017Updated 8 years ago
- An hourly updated list of subdomains gathered from certificate transparency logs☆349Oct 13, 2021Updated 4 years ago
- Takeover subdomains using AWS dangling elastic ips and have a working POC for Subdomain Takeover.☆93Jul 9, 2025Updated 7 months ago
- Retrieve the complete build history for every job ever created and executed on a given Jenkins instance.☆67Apr 25, 2025Updated 10 months ago
- Extract subdomains from rapiddns.io☆22Nov 24, 2022Updated 3 years ago
- Find orphaned IP's on cloud services☆29Oct 23, 2019Updated 6 years ago
- Tests for SSRF by injecting a specified location into different headers. This is a Rust port of m4ll0k's tool.☆37Jul 7, 2020Updated 5 years ago
- Directory/Subdomain scanner developed in GoLang.☆48Dec 5, 2020Updated 5 years ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆74Feb 16, 2019Updated 7 years ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆213Mar 31, 2020Updated 5 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆134Sep 12, 2021Updated 4 years ago
- CVE-2017-9506 - SSRF☆190Feb 14, 2022Updated 4 years ago