RenwaX23 / X
Playground
☆29Updated last month
Alternatives and similar repositories for X
Users that are interested in X are comparing it to the libraries listed below
Sorting:
- Same Origin XSS challenge☆58Updated 3 years ago
- Gopher Tomcat Deployer☆48Updated 6 years ago
- CTF writeups☆30Updated 2 years ago
- Compiled dataset of Java deserialization CVEs☆61Updated 4 years ago
- ☆34Updated 3 years ago
- Client-Side Prototype Pollution Tools☆84Updated 3 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆47Updated 4 years ago
- Burp extension to generate multi-step CSRF POC.☆30Updated 5 years ago
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆106Updated 5 years ago
- Authenticated SSRF in Grafana☆82Updated 10 months ago
- Here i will post my writeups :)☆32Updated 2 years ago
- Tool is to check for Cache Deception Attack Both For Authenticated and UnAuthenticated Pages☆44Updated 3 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Updated 5 years ago
- This repo contains Automation scripts which can be used in CTFs and Real world.☆20Updated 3 years ago
- Simple taint analyzer for PHP/WordPress using VKCOM/php-parser☆18Updated 2 years ago
- tetctf2020_amf_writeups☆23Updated 4 years ago
- A cheatsheet for exploiting server-side SVG rasterization.☆30Updated 2 years ago
- 用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞☆53Updated 4 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Updated last year
- #BugBounty #BugBounty Tools #WebDeveloper Tool☆37Updated 5 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆29Updated 3 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- YSOSERIAL Integration with burp suite☆40Updated 3 years ago
- S2-061 CVE-2020-17530☆29Updated 4 years ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 3 years ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Updated 4 years ago
- Generating payloads to reverse shell in different contexts of java.☆49Updated 2 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- ☆15Updated 3 years ago
- ☆50Updated 4 years ago