barrracud4 / image-upload-exploits
This repository contains various media files for known attacks on web applications processing media files. Useful for penetration tests and bug bounty.
☆330Updated 3 years ago
Alternatives and similar repositories for image-upload-exploits:
Users that are interested in image-upload-exploits are comparing it to the libraries listed below
- A Firefox Web Extension to improve the discovery of DOM XSS.☆272Updated 5 months ago
- Unofficial documentation for the great tool Param Miner☆179Updated 2 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆237Updated 3 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆623Updated 5 months ago
- Turbo Intruder Scripts☆221Updated 4 years ago
- List of reporting templates I have used since I started doing BBH.☆297Updated 7 months ago
- Client Side Prototype Pollution Scanner☆518Updated 2 years ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆288Updated last year
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆359Updated 4 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆310Updated 5 months ago
- A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificate☆209Updated 10 months ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆266Updated 2 years ago
- A tool to check a bunch of URLs that contain reflecting params.☆571Updated 8 months ago
- IIS shortname scanner written in Go☆330Updated 2 years ago
- Burp Extension for easily creating Wordlists☆210Updated 3 years ago
- Burpsuite plugin for Interact.sh☆220Updated 10 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆632Updated last year
- Secret and/or credential patterns used for gf.☆241Updated 2 years ago
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆504Updated 2 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆866Updated 3 years ago
- Automated learning of regexes for DNS discovery☆364Updated 2 years ago
- Monitoring framework to detect and report newly found subdomains on a specific target using various scanning tools☆273Updated 9 months ago
- Python library and CLI for the Bug Bounty Recon API☆224Updated 3 years ago
- Automating XSS using Bash☆354Updated last year
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆231Updated 3 years ago
- Gotator is a tool to generate DNS wordlists through permutations.☆475Updated 2 years ago
- A DNS Bruteforcing Wordlist Generator☆357Updated 2 years ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆497Updated last month
- A fuzzer for detecting open redirect vulnerabilities☆745Updated 9 months ago
- Nuclei templates written by us.☆269Updated 3 years ago