Bypass CDN and WAF restrictions using CDN re-fronting.
☆261Aug 25, 2022Updated 3 years ago
Alternatives and similar repositories for cdn-proxy
Users that are interested in cdn-proxy are comparing it to the libraries listed below
Sorting:
- jolokia-exploitation-toolkit☆309Dec 19, 2024Updated last year
- SMTP Netcat , test SMTP protocol☆105Jan 14, 2022Updated 4 years ago
- ☆60May 22, 2023Updated 2 years ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 3 years ago
- ☆34Sep 19, 2022Updated 3 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆953Dec 31, 2021Updated 4 years ago
- spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧☆754Apr 14, 2021Updated 4 years ago
- A rouge mysql server supports reading files from most mysql libraries of multiple programming languages.☆755Dec 2, 2022Updated 3 years ago
- RCE 0-day for GhostScript 9.50 - Payload generator☆544Sep 8, 2021Updated 4 years ago
- ☆342Updated this week
- ☆1,200Sep 2, 2022Updated 3 years ago
- Nuclei plugin for BurpSuite☆1,322Oct 22, 2025Updated 4 months ago
- Detects request smuggling via HTTP/2 downgrades.☆94Jul 30, 2022Updated 3 years ago
- ☆231Jan 3, 2022Updated 4 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Feb 16, 2022Updated 4 years ago
- ☆307Feb 27, 2025Updated last year
- Java RCE 回显测试代码☆1,016Oct 15, 2020Updated 5 years ago
- Finding Java gadget chains with CodeQL☆185Jan 14, 2025Updated last year
- 侦查守卫(ObserverWard)的指纹库☆1,334Updated this week
- ZKar is a Java serialization protocol analysis tool implement in Go.☆649Feb 15, 2025Updated last year
- domain_hunter的高级版本,SRC挖洞、HW打点之必备!自动化资产收集;快速Title获取;外部工具联动;等等☆2,116Jan 23, 2026Updated last month
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,519Updated this week
- a deterministic finite automata ranker☆72Feb 6, 2022Updated 4 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- 利用任意文件下载漏洞循环下载反编译 Class 文件获得网站 Java 源代码☆711May 10, 2021Updated 4 years ago
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆264Nov 25, 2022Updated 3 years ago
- My CodeQL queries collection☆99Aug 28, 2023Updated 2 years ago
- Nuclei Templates to reproduce Cracking the lens's Research☆132Jan 8, 2022Updated 4 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆519Jun 22, 2022Updated 3 years ago
- A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.☆184Nov 22, 2021Updated 4 years ago
- WebSocket 内存马/Webshell,一种新型内存马/WebShell技术☆1,488Apr 10, 2023Updated 2 years ago
- 注入JVM进程 动态获取目标进程连接的数据库☆342Mar 6, 2022Updated 4 years ago
- ☆295May 7, 2022Updated 3 years ago
- Java RMI Vulnerability Scanner☆915Jul 3, 2024Updated last year
- A powerful browser crawler for web vulnerability scanners☆3,016Mar 11, 2025Updated 11 months ago
- JDBC Connection URL Attack☆440Sep 10, 2021Updated 4 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- ☆275Oct 28, 2021Updated 4 years ago