bhaveshk90 / Content-Security-Policy-CSP-Bypass-TechniquesLinks
Content-Security-Policy (CSP) Bypass Techniques
☆73Updated 5 years ago
Alternatives and similar repositories for Content-Security-Policy-CSP-Bypass-Techniques
Users that are interested in Content-Security-Policy-CSP-Bypass-Techniques are comparing it to the libraries listed below
Sorting:
- Enumerate / Dump Docker Registry☆181Updated last year
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆103Updated 6 months ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆71Updated 2 years ago
- A chrome/Firefox extension to retrieve and load react javascript chunks all at once for a wide range of javascript techs☆75Updated 7 months ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆173Updated 3 years ago
- This repository contains various XXE labs set up for different languages and their different parsers. This may alternatively serve as a p…☆112Updated last year
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆157Updated last year
- Directory scans☆85Updated 3 weeks ago
- gRPC-Web Pentesting Suite + Burp Suite Extension / Hack gRPC-Web Applications (Official BApp Extension Available)☆245Updated 2 months ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆83Updated 2 years ago
- PP-finder Help you find gadget for prototype pollution exploitation☆187Updated last year
- ☆93Updated last month
- CVE Collection of jQuery UI XSS Payloads☆121Updated 3 years ago
- XXE techniques☆14Updated 4 years ago
- A better way of querying certificate transparency logs☆89Updated 9 months ago
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆81Updated 2 years ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Updated last year
- Wordlist to bruteforce for LFI☆127Updated 6 years ago
- Custom scan profiles for use with Burp Suite Pro☆150Updated last year
- An MS Sharepoint and Frontpage Auditing Tool☆57Updated last year
- Identify virtual hosts by similarity comparison☆133Updated last year
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆103Updated last year
- Transition form local file inclusion attacks to remote code exection☆67Updated 5 years ago
- ☆28Updated last year
- ☆57Updated 11 months ago
- Obtain GraphQL API schema despite disabled introspection!☆72Updated 4 years ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆151Updated 9 months ago
- Collected fuzzing payloads from different resources☆123Updated last week
- Exploits targeting Symfony☆212Updated last year
- A collection of Server-Side Prototype Pollution gadgets and exploits☆221Updated 11 months ago