barrracud4 / image-upload-exploits
This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests and bug bounty.
☆328Updated 3 years ago
Alternatives and similar repositories for image-upload-exploits:
Users that are interested in image-upload-exploits are comparing it to the libraries listed below
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆272Updated 7 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆265Updated last year
- Burp extension to create target specific and tailored wordlist from burp history.☆237Updated 3 years ago
- Client Side Prototype Pollution Scanner☆514Updated 2 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆465Updated 2 years ago
- Unofficial documentation for the great tool Param Miner☆176Updated 2 years ago
- Turbo Intruder Scripts☆222Updated 4 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆306Updated 3 months ago
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆372Updated 3 years ago
- A Firefox Web Extension to improve the discovery of DOM XSS.☆270Updated 3 months ago
- ☆396Updated 3 years ago
- IIS shortname scanner written in Go☆323Updated last year
- Automated learning of regexes for DNS discovery☆362Updated 2 years ago
- Burp Extension for easily creating Wordlists☆211Updated 3 years ago
- Nuclei templates written by us.☆267Updated 3 years ago
- A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificate☆206Updated 8 months ago
- Secret and/or credential patterns used for gf.☆238Updated 2 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆622Updated 3 months ago
- List of reporting templates I have used since I started doing BBH.☆249Updated 5 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆851Updated 3 years ago
- Scrapts Scrapts Scrapts