An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability
☆964Dec 31, 2021Updated 4 years ago
Alternatives and similar repositories for blind-ssrf-chains
Users that are interested in blind-ssrf-chains are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Contextual Content Discovery Tool☆3,139Apr 29, 2024Updated last year
- GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations☆410Dec 24, 2022Updated 3 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,486Oct 12, 2024Updated last year
- Prototype Pollution and useful Script Gadgets☆1,606Jan 27, 2024Updated 2 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,341Apr 18, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆1,304Jan 26, 2024Updated 2 years ago
- ☆1,202Sep 2, 2022Updated 3 years ago
- ☆563Mar 27, 2025Updated last year
- ☆705Nov 27, 2024Updated last year
- Scope aggregation tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!☆1,354Apr 4, 2026Updated last week
- Content-Type Research☆661Jun 29, 2025Updated 9 months ago
- Hidden parameters discovery suite☆2,044Sep 8, 2024Updated last year
- Reverse proxies cheatsheet☆1,857Nov 4, 2023Updated 2 years ago
- ☆696Jul 4, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Gotator is a tool to generate DNS wordlists through permutations.☆511Jul 17, 2022Updated 3 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,067Jan 2, 2024Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆753Dec 19, 2023Updated 2 years ago
- Client Side Prototype Pollution Scanner☆525Sep 17, 2022Updated 3 years ago
- Automatic SSRF fuzzer and exploitation tool☆3,523Sep 4, 2025Updated 7 months ago
- HTTP Request Smuggling over HTTP/2 Cleartext (h2c)☆785May 10, 2022Updated 3 years ago
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,758Feb 16, 2026Updated last month
- Automated & Manual Wordlists provided by Assetnote☆1,660Feb 27, 2026Updated last month
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,538Mar 8, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A python script that finds endpoints in JavaScript files☆4,322Apr 13, 2024Updated last year
- Obtain GraphQL API schema even if the introspection is disabled☆1,423Dec 5, 2025Updated 4 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,095Apr 3, 2026Updated last week
- List DTDs and generate XXE payloads using those local DTDs.☆655Feb 21, 2024Updated 2 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,173May 26, 2023Updated 2 years ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,363Jan 24, 2021Updated 5 years ago
- declutters url lists for crawling/pentesting☆1,544Feb 23, 2025Updated last year
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,336Aug 7, 2025Updated 8 months ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆969Jan 10, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,479Jan 9, 2025Updated last year
- Making Favicon.ico based Recon Great again !☆1,270Aug 29, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,153Aug 14, 2024Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆612Mar 4, 2021Updated 5 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆641Jul 7, 2025Updated 9 months ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆779Aug 19, 2024Updated last year
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,508Jan 8, 2026Updated 3 months ago