RenwaX23 / X
Playground
☆29Updated 3 weeks ago
Alternatives and similar repositories for X:
Users that are interested in X are comparing it to the libraries listed below
- Same Origin XSS challenge☆56Updated 3 years ago
- Compiled dataset of Java deserialization CVEs☆61Updated 4 years ago
- ☆34Updated 2 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- Client-Side Prototype Pollution Tools☆84Updated 3 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- ☆56Updated 3 years ago
- ☆164Updated 3 years ago
- CTF writeups☆30Updated 2 years ago
- ☆70Updated 3 years ago
- Gopher Tomcat Deployer☆48Updated 6 years ago
- ☆50Updated 4 years ago
- ☆17Updated last month
- tetctf2020_amf_writeups☆23Updated 4 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆47Updated 4 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year
- Chrome extension to detect possible xsleaks☆12Updated 5 years ago
- Tool is to check for Cache Deception Attack Both For Authenticated and UnAuthenticated Pages☆44Updated 3 years ago
- #BugBounty #BugBounty Tools #WebDeveloper Tool☆37Updated 5 years ago
- Image Tragick Exploit Tool Using Burp Collaborator☆36Updated 11 months ago
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆27Updated 7 years ago
- This repository is an interactive collection of my solutions to various XSS challenges.☆12Updated 4 years ago
- Dependency Confusion Security Testing Tool☆47Updated 2 years ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- ☆35Updated 3 months ago
- Here i will post my writeups :)☆32Updated 2 years ago
- This repo contains Automation scripts which can be used in CTFs and Real world.☆20Updated 3 years ago
- Prototype Pollution exploits collection☆33Updated 3 years ago
- Chrome extension that finds DOM based XSS vulnerabilities☆71Updated 2 years ago
- Query various sources for CVE proof-of-concepts☆51Updated last year