An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability
☆959Dec 31, 2021Updated 4 years ago
Alternatives and similar repositories for blind-ssrf-chains
Users that are interested in blind-ssrf-chains are comparing it to the libraries listed below
Sorting:
- Contextual Content Discovery Tool☆3,121Apr 29, 2024Updated last year
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆408Dec 24, 2022Updated 3 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,483Oct 12, 2024Updated last year
- Prototype Pollution and useful Script Gadgets☆1,601Jan 27, 2024Updated 2 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,324Apr 18, 2023Updated 2 years ago
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,296Jan 26, 2024Updated 2 years ago
- ☆1,202Sep 2, 2022Updated 3 years ago
- ☆563Mar 27, 2025Updated 11 months ago
- ☆705Nov 27, 2024Updated last year
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,337Mar 5, 2026Updated 2 weeks ago
- Content-Type Research☆658Jun 29, 2025Updated 8 months ago
- Hidden parameters discovery suite☆2,033Sep 8, 2024Updated last year
- Reverse proxies cheatsheet☆1,855Nov 4, 2023Updated 2 years ago
- ☆695Jul 4, 2022Updated 3 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆508Jul 17, 2022Updated 3 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,063Jan 2, 2024Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆755Dec 19, 2023Updated 2 years ago
- Client Side Prototype Pollution Scanner☆523Sep 17, 2022Updated 3 years ago
- Automatic SSRF fuzzer and exploitation tool☆3,505Sep 4, 2025Updated 6 months ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆785May 10, 2022Updated 3 years ago
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,744Feb 16, 2026Updated last month
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,028Feb 22, 2026Updated last month
- Automated & Manual Wordlists provided by Assetnote☆1,650Feb 27, 2026Updated 3 weeks ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,533Mar 8, 2026Updated 2 weeks ago
- Obtain GraphQL API schema even if the introspection is disabled☆1,407Dec 5, 2025Updated 3 months ago
- A python script that finds endpoints in JavaScript files☆4,300Apr 13, 2024Updated last year
- List DTDs and generate XXE payloads using those local DTDs.☆651Feb 21, 2024Updated 2 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- declutters url lists for crawling/pentesting☆1,538Feb 23, 2025Updated last year
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,364Jan 24, 2021Updated 5 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,297Aug 7, 2025Updated 7 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,477Jan 9, 2025Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,113Aug 14, 2024Updated last year
- Making Favicon.ico based Recon Great again !☆1,269Aug 29, 2023Updated 2 years ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆779Aug 19, 2024Updated last year
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆641Jul 7, 2025Updated 8 months ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,503Jan 8, 2026Updated 2 months ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆968Jan 10, 2025Updated last year