aapooksman / writeupsLinks
☆12Updated 2 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- ☆116Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆68Updated last year
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated 3 months ago
- This Chromium extensions aims at supporting the analysis of single sign-on implementations, by offering semi-automated analysis and attac…☆29Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago
- A curated list of argument injection vectors☆41Updated last year
- ☆127Updated last year
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆115Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated last year
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆105Updated 6 months ago
- Target practice for ffuf☆70Updated 4 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- ☆104Updated 3 years ago
- An extension to use Semgrep inside Burp Suite.☆89Updated 8 months ago
- ☆94Updated last month
- ☆106Updated 3 years ago
- ☆24Updated 2 years ago
- ☆31Updated 3 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 10 months ago
- Java archive implant toolkit.☆61Updated 9 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated last year
- Find CVE PoCs on GitHub☆160Updated 6 months ago
- Tool to spray AWS Console IAM Logins☆35Updated 3 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- One line command and control backdoors for APIs and web applications.☆51Updated last year
- a deterministic finite automata ranker☆73Updated 4 years ago
- Repository to store exploits created by Assetnotes Security Research team☆180Updated 2 years ago
- ☆42Updated 2 years ago