An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability
☆968Dec 31, 2021Updated 4 years ago
Alternatives and similar repositories for blind-ssrf-chains
Users that are interested in blind-ssrf-chains are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Contextual Content Discovery Tool☆3,158Apr 29, 2024Updated 2 years ago
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆411Dec 24, 2022Updated 3 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,489Oct 12, 2024Updated last year
- Prototype Pollution and useful Script Gadgets☆1,612Jan 27, 2024Updated 2 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,346Apr 18, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,308Jan 26, 2024Updated 2 years ago
- ☆1,202Sep 2, 2022Updated 3 years ago
- ☆563Mar 27, 2025Updated last year
- ☆705Nov 27, 2024Updated last year
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,368Apr 23, 2026Updated last week
- Content-Type Research☆662Jun 29, 2025Updated 10 months ago
- Hidden parameters discovery suite☆2,050Sep 8, 2024Updated last year
- Reverse proxies cheatsheet☆1,863Nov 4, 2023Updated 2 years ago
- ☆697Jul 4, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Gotator is a tool to generate DNS wordlists through permutations.☆514Jul 17, 2022Updated 3 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,069Jan 2, 2024Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆756Dec 19, 2023Updated 2 years ago
- Client Side Prototype Pollution Scanner☆524Sep 17, 2022Updated 3 years ago
- Automatic SSRF fuzzer and exploitation tool☆3,534Sep 4, 2025Updated 7 months ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆789May 10, 2022Updated 3 years ago
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,770Apr 22, 2026Updated last week
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,543Mar 8, 2026Updated last month
- Automated & Manual Wordlists provided by Assetnote☆1,671Feb 27, 2026Updated 2 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A python script that finds endpoints in JavaScript files☆4,334Apr 13, 2024Updated 2 years ago
- Obtain GraphQL API schema even if the introspection is disabled☆1,440Dec 5, 2025Updated 4 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,165Apr 3, 2026Updated 3 weeks ago
- List DTDs and generate XXE payloads using those local DTDs.☆655Feb 21, 2024Updated 2 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,367Jan 24, 2021Updated 5 years ago
- declutters url lists for crawling/pentesting☆1,551Feb 23, 2025Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,339Aug 7, 2025Updated 8 months ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆970Jan 10, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,488Jan 9, 2025Updated last year
- Making Favicon.ico based Recon Great again !☆1,277Aug 29, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,182Aug 14, 2024Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆641Jul 7, 2025Updated 9 months ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆614Mar 4, 2021Updated 5 years ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆779Aug 19, 2024Updated last year
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,511Jan 8, 2026Updated 3 months ago