SorceryIE / cfor_exploitLinks
Exploit script for the CFOR vulnerability using Github's GraphQL API
☆19Updated last year
Alternatives and similar repositories for cfor_exploit
Users that are interested in cfor_exploit are comparing it to the libraries listed below
Sorting:
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆37Updated last year
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- ☆40Updated 3 months ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated 9 months ago
- Exploits Unauth Docker API☆41Updated 5 months ago
- Make better use of the embedded browser that comes by default with Burp☆45Updated last year
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- Reversing Citrix Gateway for XSS☆17Updated 2 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated last year
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆29Updated last year
- HTTP request smuggling attack helper/CLI tools to manipulate HTTP packets☆35Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆77Updated 3 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆33Updated last year
- Looks for parameters in urls☆34Updated 11 months ago
- Ffuf output browser☆39Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated last year
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆18Updated 2 years ago
- ☆24Updated 10 months ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- an Evil Java RMI Registry.☆52Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- ☆27Updated 2 years ago
- The largest collection of wordlists in yaml for bug bounty tools☆36Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 9 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Updated last year
- crtdumper is a Go application designed to interact directly with Certificate Transparency (CT) logs servers and extract domain names fro…☆29Updated last year
- SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration☆42Updated 5 months ago
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆98Updated 6 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year