Content-Security-Policy (CSP) Bypass Techniques
☆76Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for Content-Security-Policy-CSP-Bypass-Techniques
Users that are interested in Content-Security-Policy-CSP-Bypass-Techniques are comparing it to the libraries listed below
Sorting:
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- CVE-2022-39227 : Proof of Concept☆22Mar 19, 2024Updated 2 years ago
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆57May 30, 2023Updated 2 years ago
- the POC of package.json RCE☆26Jun 24, 2025Updated 8 months ago
- ☆14Feb 12, 2026Updated last month
- Dnslog Interactsh的Py版接口查询☆13Dec 10, 2021Updated 4 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆38Apr 15, 2017Updated 8 years ago
- A GO module to get domain name from SSL certificates when an IP address is provided.☆33Apr 14, 2023Updated 2 years ago
- ☆31Aug 25, 2023Updated 2 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Offensive Web is a documentation website about web security research, bypass and new exploitation techniques.☆33Feb 14, 2026Updated last month
- A realistic windows testlab deployment tool☆12Feb 24, 2017Updated 9 years ago
- A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.☆752May 6, 2024Updated last year
- An open-source knowledge base for security researchers.☆18Jan 8, 2025Updated last year
- ☆17Apr 7, 2023Updated 2 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆13Oct 24, 2024Updated last year
- ☆22Nov 3, 2022Updated 3 years ago
- Emergency Bucket CTF backend + frontend.☆30Oct 12, 2024Updated last year
- A BurpSuite extension that allows you to use Chromium with PwnFox☆43Dec 23, 2025Updated 2 months ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 7 months ago
- aws cli pentesting/red team snippets☆33Jan 12, 2024Updated 2 years ago
- Remote CLI tools at your fingertips☆16Jul 31, 2024Updated last year
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- convert case style of words☆59Jan 12, 2024Updated 2 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated last year
- ☆18Apr 26, 2021Updated 4 years ago
- ☆26Jan 27, 2022Updated 4 years ago
- WaybackRust is a tool written in Rust to query the WaybackMachine.☆14Jul 18, 2025Updated 8 months ago
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆14Dec 27, 2024Updated last year
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- A tool for testing subdomain takeover possibilities at a mass scale.☆50May 23, 2021Updated 4 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- a JS tool that let you take screenshot of many hosts.☆13Aug 2, 2019Updated 6 years ago
- SubdomainDB is a simple self-hosted API that allows you to maintain your own subdomain database.☆31Jan 8, 2018Updated 8 years ago