Lab that will help you to understand how type juggling vulnerability works.
☆22Sep 23, 2020Updated 5 years ago
Alternatives and similar repositories for Type-juggling
Users that are interested in Type-juggling are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆26Oct 13, 2025Updated 5 months ago
- A Tool to find subdomains from hackerone reports.☆17Jun 23, 2021Updated 4 years ago
- This tool will scan all the URL's in the file and will provide Content-Length, Status-Code, Server and more.☆36Dec 22, 2021Updated 4 years ago
- Automated tool to find backup files that may disclose a website's source code☆20Oct 13, 2022Updated 3 years ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆40Aug 13, 2019Updated 6 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- ☆32May 30, 2019Updated 6 years ago
- ☆19Apr 29, 2019Updated 6 years ago
- ☆22Jul 16, 2021Updated 4 years ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- Deepsearch leak database client, as an alternative for pwndb☆15Dec 6, 2022Updated 3 years ago
- AWS,AZURE,GOOGLE CLOUD IP CIDRS☆50Feb 14, 2022Updated 4 years ago
- Rules for detecting security issues in Angular 1.x☆30Apr 20, 2023Updated 2 years ago
- MetaSec.js combines all the free open-source security tools to identify issues with JavaScript and automates the boring parts☆82Feb 4, 2023Updated 3 years ago
- ☆18Nov 18, 2022Updated 3 years ago
- ☆25May 30, 2017Updated 8 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Feb 2, 2023Updated 3 years ago
- Flask powered website to display tweets with a hashtag #bugbountytip☆16Apr 14, 2020Updated 5 years ago
- Archive - Repository contains old publicly released presentations, tools, Proof of Concepts and other junk.☆26Mar 4, 2026Updated 2 weeks ago
- A python based blind SQL injection exploitation script☆144Jan 26, 2020Updated 6 years ago
- ☆32Apr 6, 2021Updated 4 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- ☆24Jan 26, 2021Updated 5 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Bytecode based Fuzzer for the PHP language☆12Jul 22, 2020Updated 5 years ago
- Python tool for large scale git analysis. Inspired by gitrob.☆21Jun 12, 2020Updated 5 years ago