bhaveshk90 / Content-Security-Policy-CSP-Bypass-Techniques
Content-Security-Policy (CSP) Bypass Techniques
☆62Updated 4 years ago
Alternatives and similar repositories for Content-Security-Policy-CSP-Bypass-Techniques:
Users that are interested in Content-Security-Policy-CSP-Bypass-Techniques are comparing it to the libraries listed below
- LFI to RCE via phpinfo() assistance or via controlled log file☆65Updated 2 years ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆75Updated last year
- A chrome/Firefox extension to retrieve and load react javascript chunks all at once for a wide range of javascript techs☆64Updated last month
- Directory scans☆82Updated last year
- CVE Collection of jQuery UI XSS Payloads☆120Updated 2 years ago
- phpMyAdmin XSS☆116Updated 5 months ago
- CSPT is an open-source Burp Suite extension to find and exploit Client-Side Path Traversal.☆136Updated 9 months ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆121Updated last year
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆84Updated last year
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆95Updated last year
- ☆39Updated last year
- ☆131Updated 5 months ago
- A better way of querying certificate transparency logs☆84Updated 3 weeks ago
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆134Updated 4 months ago
- BChecks collection for Burp Suite Professional☆96Updated 10 months ago
- Transition form local file inclusion attacks to remote code exection☆59Updated 4 years ago
- A powerful bash script for massive XSS scanning leveraging Brute Logic's KNOXSS API☆71Updated 3 months ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆44Updated 10 months ago
- Challenges I wrote for various CTF competitions☆41Updated 9 months ago
- A tool that automates the search for IDOR vulnerabilities in web apps and APIs☆57Updated 4 years ago
- Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)☆75Updated 10 months ago
- ☆35Updated 2 years ago
- Custom scan profiles for use with Burp Suite Pro☆141Updated last year
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆119Updated last year
- HTTP verb tampering & methods enumeration☆58Updated 3 years ago
- The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489☆30Updated last year
- ☆62Updated 2 years ago
- ☆58Updated last year
- This tool tries to find interesting stuff inside static files; mainly JavaScript and JSON files.☆62Updated last year
- ☆39Updated 2 months ago