poc
☆17May 18, 2024Updated last year
Alternatives and similar repositories for nextjs-CVE-2024-34351
Users that are interested in nextjs-CVE-2024-34351 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository include Docker Machines for practicing on some of the Web Attacks.☆14Nov 20, 2023Updated 2 years ago
- Response Filter Denial of Service (RFDoS) Experimental Scanner☆16Nov 10, 2024Updated last year
- ☆18Aug 15, 2025Updated 7 months ago
- URL / IP / Email defanging with Golang. Make IoC harmless.☆20Sep 9, 2025Updated 6 months ago
- A tool to migrate Burpsuite HTTP history to Caido☆35Apr 25, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CLI tool for discovering related base domains using WhoisXMLAPI's reverse Whois endpoints☆12Jun 15, 2024Updated last year
- ☆12Feb 7, 2023Updated 3 years ago
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- Seecurity helper tool to detect entry points of WordPress plugins☆10May 16, 2024Updated last year
- vīlicus is a bug bounty api dashboard☆41Aug 13, 2023Updated 2 years ago
- XSS PoCs to elevate your alert()☆22May 18, 2023Updated 2 years ago
- ☆30Mar 12, 2026Updated 2 weeks ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆16Apr 30, 2020Updated 5 years ago
- ☆18Jul 26, 2021Updated 4 years ago
- Werkzeug password cracker☆19Nov 14, 2024Updated last year
- A powerful pentesting tool for proactive detection and exploitation of dependency confusion vulnerabilities in Node.js projects. Enhance …☆14Jul 25, 2023Updated 2 years ago
- Web 3.0 Security resources☆16Oct 12, 2023Updated 2 years ago
- Scripts and package lists used to build image files on voidbuilds.xyz☆10Mar 20, 2024Updated 2 years ago
- ☆13Feb 9, 2022Updated 4 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 6 years ago
- roundrobin with configurable rotating strategies☆15Aug 21, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆49Feb 6, 2026Updated last month
- .Net 反序列化漏洞学习☆15Aug 29, 2020Updated 5 years ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆284Aug 24, 2024Updated last year
- Simple bot visitor service for XSS challenges in CTF☆11Nov 9, 2022Updated 3 years ago
- Store my 'Useful Commands' for HTB/OSCP and additional notes from my Obisidan. Merge into Obsidian for direct formatting. Also check out …☆16Aug 16, 2023Updated 2 years ago
- ☆16May 14, 2024Updated last year
- This framework lets applications to manage user installable packages of non-binary assets☆17Mar 23, 2026Updated last week
- secure trading of CS:GO Steam community market weapons without a trusted third-party middleman☆10Jan 24, 2023Updated 3 years ago
- Proof of concept code for client-side vulnerabilities☆17Mar 14, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆13Mar 23, 2024Updated 2 years ago
- Extract entire function source code based on giving line number using Javaparser☆21Jul 15, 2025Updated 8 months ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- is a tool to automate and organize reconnaissance operations.☆25Sep 6, 2023Updated 2 years ago
- Tool to extract & validate google fcm server keys from apks☆30Jan 20, 2021Updated 5 years ago
- An HTTP client specifically developed for security researchers☆28Updated this week
- Extract plain text from Arabic Wikipedia dumps.☆13Jun 15, 2014Updated 11 years ago