bhaveshk90 / Content-Security-Policy-CSP-Bypass-TechniquesView external linksLinks
Content-Security-Policy (CSP) Bypass Techniques
☆76Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for Content-Security-Policy-CSP-Bypass-Techniques
Users that are interested in Content-Security-Policy-CSP-Bypass-Techniques are comparing it to the libraries listed below
Sorting:
- A GO module to get domain name from SSL certificates when an IP address is provided.☆34Apr 14, 2023Updated 2 years ago
- CVE-2022-39227 : Proof of Concept☆22Mar 19, 2024Updated last year
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 6 months ago
- A realistic windows testlab deployment tool☆12Feb 24, 2017Updated 8 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆13Oct 24, 2024Updated last year
- An open-source knowledge base for security researchers.☆17Jan 8, 2025Updated last year
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- ☆31Aug 25, 2023Updated 2 years ago
- WaybackRust is a tool written in Rust to query the WaybackMachine.☆13Jul 18, 2025Updated 7 months ago
- Dnslog Interactsh的Py版接口查询☆13Dec 10, 2021Updated 4 years ago
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆57May 30, 2023Updated 2 years ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- a JS tool that let you take screenshot of many hosts.☆13Aug 2, 2019Updated 6 years ago
- CTF challenges WriteUp☆14Jun 27, 2022Updated 3 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 7 years ago
- aws cli pentesting/red team snippets☆32Jan 12, 2024Updated 2 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- CTF信息安全竞赛平台后端服务☆17Jun 9, 2023Updated 2 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- Slack Bot for monitoring websites for codebase changes☆15Jun 4, 2023Updated 2 years ago
- ☆23Oct 17, 2024Updated last year
- SubdomainDB is a simple self-hosted API that allows you to maintain your own subdomain database.☆31Jan 8, 2018Updated 8 years ago
- Python-based static analyzer for Android APKs that extracts attack surface and flags high-risk vulnerability patterns with lightweight ta…☆49Jan 11, 2026Updated last month
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Repository to hold and publish Spot The Bug challenges☆20Mar 22, 2018Updated 7 years ago
- The commands and scripts I used in the Live Recon Village talks☆37Mar 14, 2021Updated 4 years ago
- ☆18Jul 26, 2021Updated 4 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- A BurpSuite extension that allows you to use Chromium with PwnFox☆42Dec 23, 2025Updated last month
- HackToday is annual ctf competition held by Cyber Security IPB☆17Mar 19, 2021Updated 4 years ago
- Query various sources for CVE proof-of-concepts☆53Jun 1, 2023Updated 2 years ago
- A tool for testing subdomain takeover possibilities at a mass scale.☆50May 23, 2021Updated 4 years ago
- ☆22Nov 3, 2022Updated 3 years ago
- collection of various grep patterns collected from tomnomnom/gf and other places☆23Oct 13, 2020Updated 5 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- A flexible Boolean Based SQL injection tool☆20Nov 15, 2022Updated 3 years ago