bhaveshk90 / Content-Security-Policy-CSP-Bypass-TechniquesLinks
Content-Security-Policy (CSP) Bypass Techniques
☆68Updated 4 years ago
Alternatives and similar repositories for Content-Security-Policy-CSP-Bypass-Techniques
Users that are interested in Content-Security-Policy-CSP-Bypass-Techniques are comparing it to the libraries listed below
Sorting:
- Enumerate / Dump Docker Registry☆179Updated last year
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆162Updated 2 years ago
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆73Updated 2 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆70Updated 2 years ago
- A chrome/Firefox extension to retrieve and load react javascript chunks all at once for a wide range of javascript techs☆72Updated 2 months ago
- Exploits targeting Symfony☆207Updated 11 months ago
- Directory scans☆83Updated last year
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆61Updated 4 years ago
- PP-finder Help you find gadget for prototype pollution exploitation☆176Updated last year
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆119Updated last year
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆147Updated last year
- Burpsuite plugin for Interact.sh☆227Updated last year
- ☆42Updated last year
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆94Updated last month
- gRPC-Web Pentesting Suite + Burp Suite Extension / Hack gRPC-Web Applications☆229Updated 6 months ago
- ☆83Updated 2 months ago
- ☆157Updated 3 years ago
- ☆28Updated last year
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆101Updated last year
- This repository contains various XXE labs set up for different languages and their different parsers. This may alternatively serve as a p…☆111Updated last year
- A better way of querying certificate transparency logs☆87Updated 4 months ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆148Updated 8 months ago
- Wordlist to bruteforce for LFI☆125Updated 5 years ago
- Custom scan profiles for use with Burp Suite Pro☆144Updated last year
- A path-normalization pentesting tool.☆129Updated last year
- ☆68Updated last year
- Extract JavaScript files from burp suite project with ease.☆93Updated 3 years ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆251Updated last year
- Transition form local file inclusion attacks to remote code exection☆65Updated 5 years ago
- ☆93Updated 3 years ago